Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.242.97.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.242.97.232.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:46:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
232.97.242.85.in-addr.arpa domain name pointer bl9-97-232.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
232.97.242.85.in-addr.arpa	name = bl9-97-232.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.217.169 attackspambots
Jul 24 01:09:27 ns3164893 sshd[15255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.217.169
Jul 24 01:09:29 ns3164893 sshd[15255]: Failed password for invalid user lg from 49.235.217.169 port 55022 ssh2
...
2020-07-24 07:10:01
129.211.7.173 attackspam
Jul 23 23:12:44 jumpserver sshd[214461]: Invalid user alfresco from 129.211.7.173 port 57582
Jul 23 23:12:46 jumpserver sshd[214461]: Failed password for invalid user alfresco from 129.211.7.173 port 57582 ssh2
Jul 23 23:17:10 jumpserver sshd[214498]: Invalid user cad from 129.211.7.173 port 42322
...
2020-07-24 07:22:32
201.231.172.33 attackspam
Invalid user test2 from 201.231.172.33 port 8961
2020-07-24 07:17:08
162.243.42.225 attack
Jul 24 00:09:02 inter-technics sshd[28962]: Invalid user ubuntu from 162.243.42.225 port 56316
Jul 24 00:09:02 inter-technics sshd[28962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225
Jul 24 00:09:02 inter-technics sshd[28962]: Invalid user ubuntu from 162.243.42.225 port 56316
Jul 24 00:09:04 inter-technics sshd[28962]: Failed password for invalid user ubuntu from 162.243.42.225 port 56316 ssh2
Jul 24 00:14:53 inter-technics sshd[29328]: Invalid user david from 162.243.42.225 port 41130
...
2020-07-24 07:18:32
49.232.162.53 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 14122 proto: tcp cat: Misc Attackbytes: 60
2020-07-24 07:37:10
139.155.86.130 attackbots
$f2bV_matches
2020-07-24 07:05:23
162.243.252.82 attackspambots
May  3 17:05:48 pi sshd[1833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.252.82 
May  3 17:05:50 pi sshd[1833]: Failed password for invalid user huiqi from 162.243.252.82 port 55708 ssh2
2020-07-24 07:19:51
112.206.169.253 attackspambots
/wp-login.php
2020-07-24 07:10:41
162.243.170.252 attackbotsspam
2020-07-23T16:57:00.637931linuxbox-skyline sshd[165632]: Invalid user ester from 162.243.170.252 port 38824
...
2020-07-24 07:23:34
162.247.74.74 attack
SSH bruteforce
2020-07-24 07:07:43
161.35.4.190 attackspambots
Jul 24 01:21:00 buvik sshd[16016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.4.190
Jul 24 01:21:03 buvik sshd[16016]: Failed password for invalid user pm from 161.35.4.190 port 48008 ssh2
Jul 24 01:24:59 buvik sshd[16495]: Invalid user admin from 161.35.4.190
...
2020-07-24 07:40:32
161.35.60.51 attackbotsspam
Jul 24 04:34:54 gw1 sshd[4586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.60.51
Jul 24 04:34:56 gw1 sshd[4586]: Failed password for invalid user mike from 161.35.60.51 port 40942 ssh2
...
2020-07-24 07:38:54
58.213.116.170 attackbots
SSH Invalid Login
2020-07-24 07:09:31
193.95.247.90 attackbotsspam
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-07-24 07:17:36
161.35.9.18 attackspam
SSH Brute Force
2020-07-24 07:35:49

Recently Reported IPs

21.110.62.59 243.168.90.16 177.131.218.238 233.230.5.54
15.180.196.48 238.166.243.57 81.157.219.226 7.155.250.196
91.150.16.128 230.145.162.81 195.0.166.246 165.53.250.250
106.53.162.153 20.75.245.82 4.131.139.84 224.229.154.9
176.52.150.120 63.108.252.22 171.227.56.100 122.186.103.171