Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Treviglio

Region: Lombardy

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.42.192.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.42.192.105.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:52:18 CST 2025
;; MSG SIZE  rcvd: 106
Host info
105.192.42.85.in-addr.arpa domain name pointer host-85-42-192-105.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.192.42.85.in-addr.arpa	name = host-85-42-192-105.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
143.255.242.190 attackbots
port scan and connect, tcp 80 (http)
2020-08-15 05:55:02
67.20.21.243 attack
port scan and connect, tcp 22 (ssh)
2020-08-15 05:58:17
52.238.107.27 attackbotsspam
2020-08-15T00:33:00.970187mail.standpoint.com.ua sshd[1185]: Failed password for root from 52.238.107.27 port 60238 ssh2
2020-08-15T00:35:28.054873mail.standpoint.com.ua sshd[1520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.238.107.27  user=root
2020-08-15T00:35:30.033526mail.standpoint.com.ua sshd[1520]: Failed password for root from 52.238.107.27 port 56692 ssh2
2020-08-15T00:37:58.160121mail.standpoint.com.ua sshd[1816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.238.107.27  user=root
2020-08-15T00:38:00.063373mail.standpoint.com.ua sshd[1816]: Failed password for root from 52.238.107.27 port 53150 ssh2
...
2020-08-15 05:43:18
212.70.149.19 attackbots
2020-08-15T00:06:20.259788www postfix/smtpd[17003]: warning: unknown[212.70.149.19]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-15T00:06:43.291641www postfix/smtpd[17003]: warning: unknown[212.70.149.19]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-15T00:07:05.241542www postfix/smtpd[17003]: warning: unknown[212.70.149.19]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-15 06:07:23
97.74.236.154 attackspam
Aug 14 18:48:58 firewall sshd[32698]: Invalid user idctest from 97.74.236.154
Aug 14 18:49:00 firewall sshd[32698]: Failed password for invalid user idctest from 97.74.236.154 port 34206 ssh2
Aug 14 18:51:02 firewall sshd[315]: Invalid user ABCDE12345 from 97.74.236.154
...
2020-08-15 06:13:37
51.255.197.164 attackbotsspam
Aug 14 23:28:30 [host] sshd[2085]: pam_unix(sshd:a
Aug 14 23:28:31 [host] sshd[2085]: Failed password
Aug 14 23:35:39 [host] sshd[2192]: pam_unix(sshd:a
2020-08-15 06:18:06
116.109.217.55 attackbots
SSH brute-force attempt
2020-08-15 05:56:11
47.25.226.50 attackspam
Automatically reported by fail2ban report script (powermetal_old)
2020-08-15 06:23:04
196.224.188.160 attack
Brute forcing RDP port 3389
2020-08-15 06:09:15
37.187.3.53 attackbots
Aug 14 23:48:09 jane sshd[20543]: Failed password for root from 37.187.3.53 port 52390 ssh2
...
2020-08-15 06:02:48
201.156.224.150 attackbots
Automatic report - Port Scan Attack
2020-08-15 05:54:41
51.75.202.218 attack
Aug 14 23:13:30 ajax sshd[14037]: Failed password for root from 51.75.202.218 port 52322 ssh2
2020-08-15 06:20:37
192.3.139.56 attackbotsspam
$f2bV_matches
2020-08-15 06:22:05
129.211.185.176 attackspambots
" "
2020-08-15 06:06:17
129.211.45.88 attackspam
web-1 [ssh] SSH Attack
2020-08-15 05:57:27

Recently Reported IPs

30.80.215.185 44.81.242.14 130.55.182.221 85.114.25.232
69.16.115.118 97.25.183.51 239.23.166.223 127.23.239.159
208.47.148.87 224.226.100.11 26.133.117.72 42.247.244.219
167.246.81.206 16.163.229.68 158.121.2.218 60.13.0.130
117.51.198.43 139.184.187.71 197.81.185.114 127.7.164.170