Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lisbon

Region: Lisboa

Country: Portugal

Internet Service Provider: MEO

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.244.112.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.244.112.237.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030802 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 08:18:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
237.112.244.85.in-addr.arpa domain name pointer bl11-112-237.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
237.112.244.85.in-addr.arpa	name = bl11-112-237.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.14 attackspambots
firewall-block, port(s): 6789/tcp, 6790/tcp
2019-12-01 06:05:18
220.244.98.26 attackspambots
leo_www
2019-12-01 06:21:26
45.7.144.2 attackspam
Nov 30 11:49:06 php1 sshd\[29645\]: Invalid user schwaderer from 45.7.144.2
Nov 30 11:49:06 php1 sshd\[29645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45-7-144-2.client.2btelecom.com.br
Nov 30 11:49:08 php1 sshd\[29645\]: Failed password for invalid user schwaderer from 45.7.144.2 port 35253 ssh2
Nov 30 11:53:23 php1 sshd\[30104\]: Invalid user asshole from 45.7.144.2
Nov 30 11:53:23 php1 sshd\[30104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45-7-144-2.client.2btelecom.com.br
2019-12-01 06:04:21
94.191.41.77 attackbots
Nov 30 16:45:08 cp sshd[21690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.41.77
2019-12-01 06:04:47
41.164.195.204 attackbots
$f2bV_matches
2019-12-01 06:15:47
200.86.33.140 attackbotsspam
Invalid user bou from 200.86.33.140 port 31365
2019-12-01 06:13:19
203.151.43.167 attack
Apr 20 19:02:58 meumeu sshd[13115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.43.167 
Apr 20 19:03:00 meumeu sshd[13115]: Failed password for invalid user Ilona from 203.151.43.167 port 60496 ssh2
Apr 20 19:06:50 meumeu sshd[13681]: Failed password for nx from 203.151.43.167 port 36908 ssh2
...
2019-12-01 06:33:08
104.236.19.232 attack
2019-11-30T14:59:19.011580abusebot-7.cloudsearch.cf sshd\[10914\]: Invalid user julianita from 104.236.19.232 port 41848
2019-12-01 06:37:15
169.57.66.150 attackspambots
3389BruteforceFW21
2019-12-01 06:20:23
31.179.183.30 attackspam
Nov 30 17:31:36 ArkNodeAT sshd\[15454\]: Invalid user server from 31.179.183.30
Nov 30 17:31:36 ArkNodeAT sshd\[15454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.183.30
Nov 30 17:31:38 ArkNodeAT sshd\[15454\]: Failed password for invalid user server from 31.179.183.30 port 57198 ssh2
2019-12-01 06:11:54
104.131.8.137 attackspambots
"Fail2Ban detected SSH brute force attempt"
2019-12-01 06:24:44
178.128.59.245 attackbots
Nov 30 17:35:02 cp sshd[17112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.59.245
2019-12-01 06:25:15
190.144.135.118 attackspam
Nov 30 16:58:24 firewall sshd[32232]: Invalid user johnny from 190.144.135.118
Nov 30 16:58:27 firewall sshd[32232]: Failed password for invalid user johnny from 190.144.135.118 port 33408 ssh2
Nov 30 17:01:49 firewall sshd[32338]: Invalid user thunquest from 190.144.135.118
...
2019-12-01 05:59:36
96.88.205.222 attackbotsspam
RDP Bruteforce
2019-12-01 06:09:31
83.97.20.253 attackspambots
Automatic report - XMLRPC Attack
2019-12-01 06:11:01

Recently Reported IPs

7.225.232.229 225.214.59.88 243.12.187.8 157.181.20.43
88.201.30.167 114.21.108.4 189.36.227.173 197.117.44.104
234.229.177.217 151.138.233.172 13.190.183.188 245.63.94.16
174.15.234.87 232.43.3.187 185.248.85.34 145.236.62.133
35.166.207.227 176.82.17.105 136.240.252.242 149.81.129.115