Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: PT Comunicacoes S.A.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
unauthorized connection attempt
2020-02-13 20:05:24
attack
unauthorized connection attempt
2020-01-17 19:11:09
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.245.73.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.245.73.22.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011700 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 19:11:05 CST 2020
;; MSG SIZE  rcvd: 116
Host info
22.73.245.85.in-addr.arpa domain name pointer bl12-73-22.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.73.245.85.in-addr.arpa	name = bl12-73-22.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.40.225.169 attackspambots
" "
2019-08-12 15:33:12
68.183.195.198 attackbotsspam
2019-08-12T04:10:48.713829abusebot-6.cloudsearch.cf sshd\[8197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.195.198  user=root
2019-08-12 16:05:28
190.124.166.99 attack
SSH Brute-Forcing (ownc)
2019-08-12 16:00:25
180.127.76.221 attack
Brute force SMTP login attempts.
2019-08-12 15:41:28
40.68.153.124 attackbotsspam
Aug 12 06:37:22 dev0-dcde-rnet sshd[9552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.68.153.124
Aug 12 06:37:24 dev0-dcde-rnet sshd[9552]: Failed password for invalid user bar from 40.68.153.124 port 53666 ssh2
Aug 12 06:41:49 dev0-dcde-rnet sshd[9557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.68.153.124
2019-08-12 15:51:08
64.113.32.29 attackbotsspam
Unauthorized SSH login attempts
2019-08-12 15:56:34
218.92.0.197 attack
Aug 12 07:16:58 game-panel sshd[2240]: Failed password for root from 218.92.0.197 port 57189 ssh2
Aug 12 07:17:00 game-panel sshd[2240]: Failed password for root from 218.92.0.197 port 57189 ssh2
Aug 12 07:17:02 game-panel sshd[2240]: Failed password for root from 218.92.0.197 port 57189 ssh2
2019-08-12 15:36:27
23.129.64.166 attackspambots
Aug 12 06:49:03 thevastnessof sshd[26718]: Failed password for root from 23.129.64.166 port 19180 ssh2
...
2019-08-12 15:49:43
123.30.240.39 attackspam
Aug 11 23:02:12 xtremcommunity sshd\[23224\]: Invalid user michelle from 123.30.240.39 port 50842
Aug 11 23:02:12 xtremcommunity sshd\[23224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.240.39
Aug 11 23:02:15 xtremcommunity sshd\[23224\]: Failed password for invalid user michelle from 123.30.240.39 port 50842 ssh2
Aug 11 23:07:26 xtremcommunity sshd\[23357\]: Invalid user simone123 from 123.30.240.39 port 44484
Aug 11 23:07:26 xtremcommunity sshd\[23357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.240.39
...
2019-08-12 16:08:55
144.76.60.198 attackspam
20 attempts against mh-misbehave-ban on hill.magehost.pro
2019-08-12 16:09:19
140.143.170.123 attack
Aug 12 09:19:11 tuxlinux sshd[31482]: Invalid user user from 140.143.170.123 port 53278
Aug 12 09:19:11 tuxlinux sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.170.123 
Aug 12 09:19:11 tuxlinux sshd[31482]: Invalid user user from 140.143.170.123 port 53278
Aug 12 09:19:11 tuxlinux sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.170.123 
Aug 12 09:19:11 tuxlinux sshd[31482]: Invalid user user from 140.143.170.123 port 53278
Aug 12 09:19:11 tuxlinux sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.170.123 
Aug 12 09:19:13 tuxlinux sshd[31482]: Failed password for invalid user user from 140.143.170.123 port 53278 ssh2
...
2019-08-12 15:42:01
80.237.68.228 attack
SSH Brute-Force attacks
2019-08-12 16:01:53
129.213.117.53 attack
Aug 12 07:14:20 MK-Soft-Root2 sshd\[29223\]: Invalid user server from 129.213.117.53 port 20361
Aug 12 07:14:20 MK-Soft-Root2 sshd\[29223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.117.53
Aug 12 07:14:21 MK-Soft-Root2 sshd\[29223\]: Failed password for invalid user server from 129.213.117.53 port 20361 ssh2
...
2019-08-12 15:52:37
114.67.93.39 attackspam
Aug 12 09:35:05 eventyay sshd[6465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.93.39
Aug 12 09:35:07 eventyay sshd[6465]: Failed password for invalid user user5 from 114.67.93.39 port 58006 ssh2
Aug 12 09:40:21 eventyay sshd[7684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.93.39
...
2019-08-12 15:42:33
68.183.85.75 attackspam
$f2bV_matches_ltvn
2019-08-12 16:13:00

Recently Reported IPs

195.140.230.121 194.19.237.138 190.147.156.229 190.79.182.199
189.15.174.195 187.74.17.72 183.80.89.24 181.73.147.81
156.213.96.132 154.125.92.7 124.121.92.142 116.58.227.29
114.38.62.17 113.190.86.75 110.153.71.106 103.252.12.213
102.41.236.162 99.16.85.113 93.118.182.162 92.39.70.30