Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beja

Region: Beja

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: Servicos De Comunicacoes E Multimedia S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.243.104.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26320
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.243.104.50.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 07:53:36 CST 2019
;; MSG SIZE  rcvd: 117

Host info
50.104.243.85.in-addr.arpa domain name pointer bl10-104-50.dsl.telepac.pt.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
50.104.243.85.in-addr.arpa	name = bl10-104-50.dsl.telepac.pt.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
85.192.156.101 attack
unauthorized connection attempt
2020-01-28 15:43:48
89.248.168.62 attackspam
Jan 28 07:57:52 debian-2gb-nbg1-2 kernel: \[2453939.505875\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.62 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=52749 PROTO=TCP SPT=53469 DPT=1234 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-28 15:29:20
186.10.26.26 attackbotsspam
unauthorized connection attempt
2020-01-28 15:02:19
142.93.128.238 attackbotsspam
port scan and connect, tcp 443 (https)
2020-01-28 15:28:09
185.153.198.249 attackspambots
unauthorized access on port 443 [https] FO
2020-01-28 15:24:50
220.133.98.95 attackspambots
unauthorized connection attempt
2020-01-28 15:33:26
78.189.20.219 attack
unauthorized connection attempt
2020-01-28 15:07:39
95.156.249.198 attackbots
unauthorized connection attempt
2020-01-28 15:05:36
209.17.96.226 attackbots
Honeypot attack, port: 4567, PTR: 209.17.96.226.rdns.cloudsystemnetworks.com.
2020-01-28 15:22:38
95.165.217.158 attackspambots
unauthorized connection attempt
2020-01-28 15:17:32
49.207.140.63 attackbots
1580187562 - 01/28/2020 05:59:22 Host: 49.207.140.63/49.207.140.63 Port: 445 TCP Blocked
2020-01-28 15:31:39
172.105.94.128 attackspam
unauthorized access on port 443 [https] FO
2020-01-28 15:26:35
189.180.7.18 attack
unauthorized connection attempt
2020-01-28 15:34:12
187.162.4.79 attackspam
unauthorized connection attempt
2020-01-28 15:48:27
189.170.19.100 attackbots
unauthorized connection attempt
2020-01-28 15:34:34

Recently Reported IPs

188.161.202.112 181.188.163.166 216.159.93.1 39.50.123.249
184.250.130.144 103.102.237.207 160.12.233.48 101.98.39.118
89.135.51.39 160.16.29.254 174.116.129.184 187.119.18.142
218.106.101.76 103.102.237.135 108.173.222.249 66.28.139.102
18.203.149.234 198.100.149.77 188.166.75.139 139.201.189.130