Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
85.247.52.211 attackbotsspam
Nov 28 13:53:20 sachi sshd\[9094\]: Invalid user asterisk from 85.247.52.211
Nov 28 13:53:20 sachi sshd\[9094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl14-52-211.dsl.telepac.pt
Nov 28 13:53:21 sachi sshd\[9094\]: Failed password for invalid user asterisk from 85.247.52.211 port 54843 ssh2
Nov 28 13:59:34 sachi sshd\[9556\]: Invalid user guest from 85.247.52.211
Nov 28 13:59:34 sachi sshd\[9556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl14-52-211.dsl.telepac.pt
2019-11-29 08:19:10
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.247.52.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.247.52.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 13:18:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
192.52.247.85.in-addr.arpa domain name pointer bl14-52-192.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
192.52.247.85.in-addr.arpa	name = bl14-52-192.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.54.208.123 attack
sshd: Failed password for .... from 106.54.208.123 port 56028 ssh2 (10 attempts)
2020-09-07 17:09:57
209.141.50.67 attackspambots
Port scan denied
2020-09-07 17:31:26
41.251.248.90 attackbots
Automatic report - Banned IP Access
2020-09-07 17:24:29
106.13.234.23 attack
2020-09-07T02:26:41.8712551495-001 sshd[48527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.23  user=root
2020-09-07T02:26:43.7387371495-001 sshd[48527]: Failed password for root from 106.13.234.23 port 57102 ssh2
2020-09-07T02:29:37.2410411495-001 sshd[48765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.23  user=root
2020-09-07T02:29:39.6050991495-001 sshd[48765]: Failed password for root from 106.13.234.23 port 59412 ssh2
2020-09-07T02:32:42.7804951495-001 sshd[48940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.23  user=root
2020-09-07T02:32:44.8737361495-001 sshd[48940]: Failed password for root from 106.13.234.23 port 42404 ssh2
...
2020-09-07 17:06:34
180.183.17.209 attack
Wordpress File Manager Plugin Remote Code Execution Vulnerability, PTR: mx-ll-180.183.17-209.dynamic.3bb.in.th.
2020-09-07 17:25:17
85.247.242.96 attackbotsspam
Wordpress File Manager Plugin Remote Code Execution Vulnerability, PTR: bl14-242-96.dsl.telepac.pt.
2020-09-07 17:28:55
58.213.116.170 attackspam
$f2bV_matches
2020-09-07 17:09:40
139.99.141.237 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: svr02-vs02.svr02.goau.net.au.
2020-09-07 16:53:12
217.23.10.20 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-07T06:01:59Z and 2020-09-07T06:31:54Z
2020-09-07 17:11:40
122.118.2.162 attackbots
port 23
2020-09-07 17:23:43
171.224.178.134 attackbots
1599410916 - 09/06/2020 18:48:36 Host: 171.224.178.134/171.224.178.134 Port: 445 TCP Blocked
2020-09-07 17:30:27
139.199.85.241 attackspam
sshd: Failed password for .... from 139.199.85.241 port 39654 ssh2 (8 attempts)
2020-09-07 17:10:45
209.141.48.230 attack
 TCP (SYN) 209.141.48.230:58762 -> port 23, len 40
2020-09-07 16:57:24
101.231.124.6 attackspambots
"fail2ban match"
2020-09-07 16:52:42
45.142.120.36 attack
2020-09-07 12:27:19 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=assets2@org.ua\)2020-09-07 12:27:56 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=s33@org.ua\)2020-09-07 12:28:34 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=blogs@org.ua\)
...
2020-09-07 17:29:11

Recently Reported IPs

82.209.176.141 214.173.38.130 237.63.237.91 193.4.26.100
42.57.245.172 78.190.199.12 127.238.160.89 184.192.244.4
46.153.203.101 231.22.61.10 250.229.92.206 140.66.228.54
37.244.26.253 18.8.7.64 132.201.137.217 30.117.184.168
146.189.8.21 130.241.69.88 144.239.177.202 196.58.66.117