Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: PT Comunicacoes S.A.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Dec  9 08:34:24 tux-35-217 sshd\[19944\]: Invalid user smackdown from 85.244.47.238 port 52151
Dec  9 08:34:24 tux-35-217 sshd\[19944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.244.47.238
Dec  9 08:34:27 tux-35-217 sshd\[19944\]: Failed password for invalid user smackdown from 85.244.47.238 port 52151 ssh2
Dec  9 08:44:07 tux-35-217 sshd\[20086\]: Invalid user test from 85.244.47.238 port 65025
Dec  9 08:44:07 tux-35-217 sshd\[20086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.244.47.238
...
2019-12-09 20:04:13
attack
Nov 21 13:53:32 v22018086721571380 sshd[13329]: Failed password for invalid user shwed from 85.244.47.238 port 56567 ssh2
2019-11-21 21:53:33
attack
2019-09-28T00:04:39.126072tmaserv sshd\[30289\]: Invalid user internet from 85.244.47.238 port 59211
2019-09-28T00:04:39.130385tmaserv sshd\[30289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl11-47-238.dsl.telepac.pt
2019-09-28T00:04:41.314351tmaserv sshd\[30289\]: Failed password for invalid user internet from 85.244.47.238 port 59211 ssh2
2019-09-28T00:11:37.011270tmaserv sshd\[30773\]: Invalid user www from 85.244.47.238 port 56832
2019-09-28T00:11:37.015927tmaserv sshd\[30773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl11-47-238.dsl.telepac.pt
2019-09-28T00:11:38.653830tmaserv sshd\[30773\]: Failed password for invalid user www from 85.244.47.238 port 56832 ssh2
...
2019-09-28 05:25:39
attackspambots
" "
2019-09-07 07:44:46
attackbotsspam
$f2bV_matches_ltvn
2019-08-21 05:03:53
attackspambots
SSH/22 MH Probe, BF, Hack -
2019-06-23 11:03:56
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.244.47.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45027
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.244.47.238.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 09 15:46:40 CST 2019
;; MSG SIZE  rcvd: 117

Host info
238.47.244.85.in-addr.arpa domain name pointer bl11-47-238.dsl.telepac.pt.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
238.47.244.85.in-addr.arpa	name = bl11-47-238.dsl.telepac.pt.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
69.94.141.74 attack
Mar 17 00:28:53 web01 postfix/smtpd[19162]: warning: hostname 69-94-141-74.nca.datanoc.com does not resolve to address 69.94.141.74
Mar 17 00:28:53 web01 postfix/smtpd[19162]: connect from unknown[69.94.141.74]
Mar 17 00:28:53 web01 policyd-spf[20223]: None; identhostnamey=helo; client-ip=69.94.141.74; helo=grateful.1nosnore-sk.com; envelope-from=x@x
Mar 17 00:28:53 web01 policyd-spf[20223]: Pass; identhostnamey=mailfrom; client-ip=69.94.141.74; helo=grateful.1nosnore-sk.com; envelope-from=x@x
Mar x@x
Mar 17 00:28:54 web01 postfix/smtpd[19162]: disconnect from unknown[69.94.141.74]
Mar 17 00:29:44 web01 postfix/smtpd[19162]: warning: hostname 69-94-141-74.nca.datanoc.com does not resolve to address 69.94.141.74
Mar 17 00:29:44 web01 postfix/smtpd[19162]: connect from unknown[69.94.141.74]
Mar 17 00:29:44 web01 policyd-spf[20223]: None; identhostnamey=helo; client-ip=69.94.141.74; helo=grateful.1nosnore-sk.com; envelope-from=x@x
Mar 17 00:29:44 web01 policyd-spf[20223]: ........
-------------------------------
2020-03-17 12:35:46
95.6.35.193 attack
Automatic report - Port Scan Attack
2020-03-17 12:18:43
202.70.72.217 attackbotsspam
(sshd) Failed SSH login from 202.70.72.217 (NP/Nepal/-/-/-/[AS23752 Nepal Telecommunications Corporation, Internet Services]): 1 in the last 3600 secs
2020-03-17 12:36:59
46.0.203.166 attackspambots
Mar 17 03:34:25 vpn01 sshd[20702]: Failed password for root from 46.0.203.166 port 51656 ssh2
...
2020-03-17 12:27:18
110.39.194.186 attackspam
Unauthorized connection attempt from IP address 110.39.194.186 on Port 445(SMB)
2020-03-17 12:03:35
206.189.132.8 attackbotsspam
Mar 17 04:48:51 tuxlinux sshd[23058]: Invalid user ubuntu from 206.189.132.8 port 34728
Mar 17 04:48:51 tuxlinux sshd[23058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.8 
Mar 17 04:48:51 tuxlinux sshd[23058]: Invalid user ubuntu from 206.189.132.8 port 34728
Mar 17 04:48:51 tuxlinux sshd[23058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.8 
...
2020-03-17 12:13:45
125.26.20.110 attackbotsspam
Unauthorized connection attempt detected from IP address 125.26.20.110 to port 445
2020-03-17 11:54:10
77.40.3.243 attackspam
failed_logins
2020-03-17 12:20:35
185.21.65.253 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/185.21.65.253/ 
 
 RU - 1H : (62)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN61016 
 
 IP : 185.21.65.253 
 
 CIDR : 185.21.64.0/22 
 
 PREFIX COUNT : 1 
 
 UNIQUE IP COUNT : 1024 
 
 
 ATTACKS DETECTED ASN61016 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-03-17 00:32:30 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-17 12:25:40
222.186.173.226 attack
2020-03-17T05:23:25.429338scmdmz1 sshd[9009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
2020-03-17T05:23:27.845128scmdmz1 sshd[9009]: Failed password for root from 222.186.173.226 port 42487 ssh2
2020-03-17T05:23:31.034815scmdmz1 sshd[9009]: Failed password for root from 222.186.173.226 port 42487 ssh2
...
2020-03-17 12:24:26
218.92.0.175 attackbotsspam
Mar 17 00:10:25 NPSTNNYC01T sshd[7897]: Failed password for root from 218.92.0.175 port 16490 ssh2
Mar 17 00:10:40 NPSTNNYC01T sshd[7897]: error: maximum authentication attempts exceeded for root from 218.92.0.175 port 16490 ssh2 [preauth]
Mar 17 00:10:46 NPSTNNYC01T sshd[7902]: Failed password for root from 218.92.0.175 port 46785 ssh2
...
2020-03-17 12:19:09
138.59.218.229 attack
1584401577 - 03/17/2020 00:32:57 Host: 138.59.218.229/138.59.218.229 Port: 445 TCP Blocked
2020-03-17 12:06:57
112.85.42.176 attackbotsspam
web-1 [ssh_2] SSH Attack
2020-03-17 11:55:47
88.223.114.198 attack
Chat Spam
2020-03-17 12:20:10
36.71.235.192 attackspambots
Unauthorized connection attempt from IP address 36.71.235.192 on Port 445(SMB)
2020-03-17 12:16:54

Recently Reported IPs

118.200.41.41 187.0.221.222 170.80.224.229 94.233.46.114
205.185.124.95 113.196.140.200 113.111.70.10 167.114.12.201
118.204.97.125 81.22.45.35 234.4.0.0 211.156.140.253
206.114.206.108 29.190.219.34 37.142.192.49 125.136.112.123
79.63.180.0 14.199.39.184 178.62.251.11 240.233.243.137