Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.85.14.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.85.14.142.			IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 20:20:40 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 142.14.85.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.14.85.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.215.244.62 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-29/07-24]9pkt,1pt.(tcp)
2019-07-25 03:04:41
106.12.85.172 attackspam
SSH Brute-Force on port 22
2019-07-25 03:35:18
37.228.117.32 attack
These are people / users who try to send programs for data capture (spy), see examples below, there are no limits:

From root@nn15.varejovips.com Wed Jul 24 03:13:41 2019
Received: from nn15.varejovips.com ([37.228.117.32]:39654)
(envelope-from )
Received: by nn15.varejovips.com (Postfix, from userid 0)
Subject: Comprovante de Ordem de Pagamento. Retirar em uma agencia BB. DOC29119254BR
From: Financeiro - Mariana Carvalho 
2.0 PYZOR_CHECK  Listed in Pyzor    (https://pyzor.readthedocs.io/en/latest/)
2019-07-25 03:12:13
23.94.17.122 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: 23-94-17-122-host.colocrossing.com.
2019-07-25 03:15:08
178.141.254.188 attack
445/tcp 445/tcp 445/tcp...
[2019-05-25/07-24]5pkt,1pt.(tcp)
2019-07-25 02:55:53
187.58.79.83 attackspambots
Automatic report - Port Scan Attack
2019-07-25 03:13:19
58.214.13.42 attackbots
SSH Bruteforce @ SigaVPN honeypot
2019-07-25 03:00:15
185.220.101.20 attackbots
Jul 24 18:45:10 km20725 sshd\[4886\]: Failed password for root from 185.220.101.20 port 43936 ssh2Jul 24 18:45:13 km20725 sshd\[4886\]: Failed password for root from 185.220.101.20 port 43936 ssh2Jul 24 18:45:16 km20725 sshd\[4886\]: Failed password for root from 185.220.101.20 port 43936 ssh2Jul 24 18:45:19 km20725 sshd\[4886\]: Failed password for root from 185.220.101.20 port 43936 ssh2
...
2019-07-25 03:07:18
221.162.255.82 attackbots
2019-07-24T19:09:08.345439abusebot.cloudsearch.cf sshd\[4897\]: Invalid user rasa from 221.162.255.82 port 55780
2019-07-24T19:09:08.350689abusebot.cloudsearch.cf sshd\[4897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.82
2019-07-25 03:26:17
185.137.111.5 attackspam
Jul 24 20:34:42 mail postfix/smtpd\[20825\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 24 21:05:00 mail postfix/smtpd\[21739\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 24 21:05:54 mail postfix/smtpd\[21739\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 24 21:06:46 mail postfix/smtpd\[22109\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-25 03:08:50
172.105.192.195 attackspam
firewall-block, port(s): 9089/tcp
2019-07-25 03:25:02
134.209.104.186 attackspambots
23/tcp 23/tcp 23/tcp...
[2019-07-13/24]8pkt,1pt.(tcp)
2019-07-25 03:12:44
83.97.20.36 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-25 03:25:48
188.166.72.240 attackbots
2019-07-24T17:52:33.950657abusebot-4.cloudsearch.cf sshd\[4944\]: Invalid user test5 from 188.166.72.240 port 47512
2019-07-25 03:19:29
59.127.155.17 attackbots
23/tcp 23/tcp 23/tcp...
[2019-06-12/07-24]6pkt,1pt.(tcp)
2019-07-25 03:27:32

Recently Reported IPs

10.83.219.252 10.82.148.72 10.80.97.4 10.86.84.251
10.81.2.65 10.81.116.132 10.87.102.151 10.86.86.242
10.81.35.186 10.80.69.111 10.91.151.229 10.86.126.198
10.83.170.217 10.85.17.77 10.83.57.134 10.85.197.56
10.81.26.55 10.85.26.109 10.81.47.115 10.84.220.217