Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.3.55.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.3.55.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 04:47:11 CST 2025
;; MSG SIZE  rcvd: 103
Host info
48.55.3.85.in-addr.arpa domain name pointer 48.55.3.85.dynamic.cust.swisscom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.55.3.85.in-addr.arpa	name = 48.55.3.85.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.0.242.100 attackspam
Dec  5 16:02:59 mail sshd[31601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.0.242.100
Dec  5 16:03:01 mail sshd[31601]: Failed password for invalid user postgres from 61.0.242.100 port 45672 ssh2
...
2019-12-06 00:37:46
104.131.167.134 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-06 00:59:33
118.163.178.146 attack
Dec  5 21:19:53 gw1 sshd[24173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.178.146
Dec  5 21:19:55 gw1 sshd[24173]: Failed password for invalid user jenkins from 118.163.178.146 port 44211 ssh2
...
2019-12-06 00:49:56
110.53.234.28 attackbots
" "
2019-12-06 01:01:53
5.249.131.161 attackspam
2019-12-05T16:29:38.266042centos sshd\[16158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.131.161  user=root
2019-12-05T16:29:39.781632centos sshd\[16158\]: Failed password for root from 5.249.131.161 port 13354 ssh2
2019-12-05T16:38:28.557239centos sshd\[16481\]: Invalid user admin from 5.249.131.161 port 44026
2019-12-06 00:41:45
161.117.0.23 attack
Dec  5 19:11:00 hosting sshd[12315]: Invalid user test from 161.117.0.23 port 43730
...
2019-12-06 00:57:42
157.230.113.218 attackspam
Dec  5 17:28:18 ns381471 sshd[12388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
Dec  5 17:28:20 ns381471 sshd[12388]: Failed password for invalid user cacti1 from 157.230.113.218 port 45236 ssh2
2019-12-06 00:30:17
125.230.127.216 attackspambots
Port 1433 Scan
2019-12-06 00:46:50
218.92.0.154 attackspam
Dec  5 18:02:56 ns381471 sshd[13817]: Failed password for root from 218.92.0.154 port 47169 ssh2
Dec  5 18:02:58 ns381471 sshd[13817]: Failed password for root from 218.92.0.154 port 47169 ssh2
2019-12-06 01:03:20
222.186.175.182 attack
Dec  5 17:41:25 srv206 sshd[4287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Dec  5 17:41:27 srv206 sshd[4287]: Failed password for root from 222.186.175.182 port 25340 ssh2
...
2019-12-06 00:43:40
222.186.175.183 attackspambots
Dec  5 17:12:44 sd-53420 sshd\[14531\]: User root from 222.186.175.183 not allowed because none of user's groups are listed in AllowGroups
Dec  5 17:12:44 sd-53420 sshd\[14531\]: Failed none for invalid user root from 222.186.175.183 port 53034 ssh2
Dec  5 17:12:44 sd-53420 sshd\[14531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Dec  5 17:12:46 sd-53420 sshd\[14531\]: Failed password for invalid user root from 222.186.175.183 port 53034 ssh2
Dec  5 17:12:49 sd-53420 sshd\[14531\]: Failed password for invalid user root from 222.186.175.183 port 53034 ssh2
...
2019-12-06 00:22:54
139.199.22.148 attackspam
Dec  5 06:50:01 php1 sshd\[1572\]: Invalid user rpm from 139.199.22.148
Dec  5 06:50:01 php1 sshd\[1572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.22.148
Dec  5 06:50:03 php1 sshd\[1572\]: Failed password for invalid user rpm from 139.199.22.148 port 51306 ssh2
Dec  5 06:57:13 php1 sshd\[2574\]: Invalid user misawa from 139.199.22.148
Dec  5 06:57:13 php1 sshd\[2574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.22.148
2019-12-06 01:00:51
198.27.67.87 attackspambots
198.27.67.87 - - \[05/Dec/2019:16:02:52 +0100\] "POST /wp-login.php HTTP/1.0" 200 4128 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.27.67.87 - - \[05/Dec/2019:16:02:53 +0100\] "POST /wp-login.php HTTP/1.0" 200 4134 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.27.67.87 - - \[05/Dec/2019:16:02:53 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-06 00:43:55
222.186.173.215 attackspam
Dec  5 17:30:42 vmanager6029 sshd\[24040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Dec  5 17:30:44 vmanager6029 sshd\[24040\]: Failed password for root from 222.186.173.215 port 9014 ssh2
Dec  5 17:30:48 vmanager6029 sshd\[24040\]: Failed password for root from 222.186.173.215 port 9014 ssh2
2019-12-06 00:34:47
106.118.224.210 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-12-06 00:39:33

Recently Reported IPs

196.122.108.197 237.71.167.231 191.30.140.137 70.241.155.191
225.102.138.132 103.85.86.136 97.84.255.28 144.92.73.219
168.25.15.10 60.85.0.34 75.12.165.72 64.234.198.174
152.237.159.141 94.21.68.247 235.174.101.58 113.58.4.248
169.43.138.147 231.94.69.5 18.194.58.225 7.34.176.68