Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Quinta do Anjo

Region: Setúbal

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: Servicos De Comunicacoes E Multimedia S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
85.243.182.91 attackbots
37215/tcp
[2020-10-02]1pkt
2020-10-04 08:16:09
85.243.182.91 attackbotsspam
37215/tcp
[2020-10-02]1pkt
2020-10-04 00:42:06
85.243.182.91 attackspam
37215/tcp
[2020-10-02]1pkt
2020-10-03 16:31:41
85.243.15.17 attackbotsspam
85.243.15.17 - [28/Aug/2020:19:30:12 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
85.243.15.17 - [28/Aug/2020:19:36:19 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-08-29 00:51:21
85.243.15.17 attackspam
85.243.15.17 - [28/Aug/2020:00:02:06 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
85.243.15.17 - [28/Aug/2020:00:06:38 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-08-28 08:05:46
85.243.15.17 attackspambots
85.243.15.17 - [27/Aug/2020:00:05:09 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
85.243.15.17 - [27/Aug/2020:00:08:45 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-08-27 09:41:13
85.243.15.17 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-21 00:16:07
85.243.128.8 attackbots
Mar 19 00:14:58 silence02 sshd[23274]: Failed password for root from 85.243.128.8 port 50894 ssh2
Mar 19 00:17:47 silence02 sshd[23488]: Failed password for root from 85.243.128.8 port 51220 ssh2
2020-03-19 09:32:49
85.243.128.8 attack
SSH Invalid Login
2020-03-10 09:23:33
85.243.128.8 attack
Mar  1 16:28:00 MK-Soft-VM6 sshd[2890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.243.128.8 
Mar  1 16:28:02 MK-Soft-VM6 sshd[2890]: Failed password for invalid user patrol from 85.243.128.8 port 42272 ssh2
...
2020-03-01 23:56:47
85.243.128.8 attackspam
Feb 22 18:55:41 auw2 sshd\[28781\]: Invalid user ubuntu from 85.243.128.8
Feb 22 18:55:41 auw2 sshd\[28781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl10-128-8.dsl.telepac.pt
Feb 22 18:55:43 auw2 sshd\[28781\]: Failed password for invalid user ubuntu from 85.243.128.8 port 33230 ssh2
Feb 22 18:58:20 auw2 sshd\[28995\]: Invalid user qw from 85.243.128.8
Feb 22 18:58:20 auw2 sshd\[28995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl10-128-8.dsl.telepac.pt
2020-02-23 13:14:51
85.243.128.8 attackspambots
Feb 15 06:40:23 ws24vmsma01 sshd[168340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.243.128.8
Feb 15 06:40:25 ws24vmsma01 sshd[168340]: Failed password for invalid user daichuqu from 85.243.128.8 port 38980 ssh2
...
2020-02-15 18:26:33
85.243.128.8 attackbotsspam
Feb 14 06:58:32 MK-Soft-VM3 sshd[9434]: Failed password for root from 85.243.128.8 port 60120 ssh2
...
2020-02-14 14:16:24
85.243.134.107 attack
Chat Spam
2019-09-20 04:55:27
85.243.169.187 attack
Sat, 20 Jul 2019 21:54:47 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 12:21:39
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.243.1.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32435
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.243.1.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 15 10:50:00 +08 2019
;; MSG SIZE  rcvd: 115

Host info
45.1.243.85.in-addr.arpa domain name pointer bl10-1-45.dsl.telepac.pt.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
45.1.243.85.in-addr.arpa	name = bl10-1-45.dsl.telepac.pt.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
104.236.100.42 attackbots
CMS (WordPress or Joomla) login attempt.
2020-06-19 12:16:08
46.21.208.131 attackbotsspam
(PL/Poland/-) SMTP Bruteforcing attempts
2020-06-19 12:52:26
138.197.179.94 attack
Automatic report - XMLRPC Attack
2020-06-19 12:32:36
87.191.171.244 attackspam
$f2bV_matches
2020-06-19 12:11:40
216.250.190.160 attackspambots
SSH login attempts.
2020-06-19 12:18:45
222.186.30.218 attackbots
Unauthorized connection attempt detected from IP address 222.186.30.218 to port 22
2020-06-19 12:45:07
161.51.4.107 attackspam
SSH login attempts.
2020-06-19 12:35:49
184.83.43.197 attack
Brute forcing email accounts
2020-06-19 12:42:48
199.34.228.59 attackbotsspam
SSH login attempts.
2020-06-19 12:36:18
180.117.100.34 attackbots
SSH login attempts.
2020-06-19 12:23:24
51.75.202.218 attackspam
2020-06-19T07:32:51.936122mail.standpoint.com.ua sshd[18445]: Failed password for invalid user sinus from 51.75.202.218 port 52704 ssh2
2020-06-19T07:35:59.550858mail.standpoint.com.ua sshd[19026]: Invalid user laravel from 51.75.202.218 port 52294
2020-06-19T07:35:59.554146mail.standpoint.com.ua sshd[19026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.ip-51-75-202.eu
2020-06-19T07:35:59.550858mail.standpoint.com.ua sshd[19026]: Invalid user laravel from 51.75.202.218 port 52294
2020-06-19T07:36:02.070018mail.standpoint.com.ua sshd[19026]: Failed password for invalid user laravel from 51.75.202.218 port 52294 ssh2
...
2020-06-19 12:51:14
192.36.171.203 attack
SSH login attempts.
2020-06-19 12:45:45
46.23.137.33 attackbots
(CZ/Czechia/-) SMTP Bruteforcing attempts
2020-06-19 12:14:23
66.112.179.1 attackbotsspam
SSH login attempts.
2020-06-19 12:14:05
112.85.42.189 attackspam
Jun 19 09:45:38 dhoomketu sshd[870604]: Failed password for root from 112.85.42.189 port 26236 ssh2
Jun 19 09:45:34 dhoomketu sshd[870604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
Jun 19 09:45:35 dhoomketu sshd[870604]: Failed password for root from 112.85.42.189 port 26236 ssh2
Jun 19 09:45:38 dhoomketu sshd[870604]: Failed password for root from 112.85.42.189 port 26236 ssh2
Jun 19 09:45:41 dhoomketu sshd[870604]: Failed password for root from 112.85.42.189 port 26236 ssh2
...
2020-06-19 12:31:43

Recently Reported IPs

72.219.179.63 35.187.3.173 89.238.154.37 123.134.251.25
159.89.205.73 122.144.212.142 118.25.61.152 202.83.17.223
116.196.90.63 66.70.227.55 178.62.255.206 139.199.80.213
114.141.104.45 124.239.166.90 35.196.204.242 93.171.11.209
1.54.135.96 213.89.203.141 159.255.19.30 103.21.91.133