Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.199.201.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.199.201.85.			IN	A

;; AUTHORITY SECTION:
.			171	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:46:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 85.201.199.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.201.199.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.221.240.56 attackspambots
badbot
2019-11-22 20:41:19
37.187.12.126 attackbotsspam
2019-11-22 10:00:11,867 fail2ban.actions: WARNING [ssh] Ban 37.187.12.126
2019-11-22 20:47:49
186.233.178.93 attackspambots
Unauthorised access (Nov 22) SRC=186.233.178.93 LEN=40 TTL=235 ID=1045 DF TCP DPT=8080 WINDOW=14600 SYN
2019-11-22 20:46:21
180.76.157.48 attackspambots
Nov 22 10:02:50 legacy sshd[25421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.157.48
Nov 22 10:02:52 legacy sshd[25421]: Failed password for invalid user biegaj from 180.76.157.48 port 56490 ssh2
Nov 22 10:08:13 legacy sshd[25604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.157.48
...
2019-11-22 20:41:02
45.136.108.65 attack
Microsoft Windows Terminal server RDP over non-standard port attempt
2019-11-22 20:20:18
182.247.61.71 attackbotsspam
badbot
2019-11-22 20:33:32
58.62.207.50 attack
Automatic report - Banned IP Access
2019-11-22 20:28:22
223.215.181.205 attack
badbot
2019-11-22 20:29:29
88.250.15.252 attackbotsspam
Automatic report - Port Scan Attack
2019-11-22 20:31:22
171.244.18.14 attackbots
2019-11-22T07:25:28.456656abusebot-6.cloudsearch.cf sshd\[5423\]: Invalid user zimbra from 171.244.18.14 port 59557
2019-11-22 20:29:11
113.100.86.98 attackbots
badbot
2019-11-22 20:45:38
122.96.45.137 attack
badbot
2019-11-22 20:38:58
106.57.151.157 attackbotsspam
badbot
2019-11-22 20:27:59
103.253.107.43 attackspambots
Nov 22 02:10:28 wbs sshd\[32185\]: Invalid user ssh from 103.253.107.43
Nov 22 02:10:28 wbs sshd\[32185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.107.43
Nov 22 02:10:30 wbs sshd\[32185\]: Failed password for invalid user ssh from 103.253.107.43 port 37376 ssh2
Nov 22 02:15:38 wbs sshd\[32623\]: Invalid user guest from 103.253.107.43
Nov 22 02:15:38 wbs sshd\[32623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.107.43
2019-11-22 20:55:48
72.43.141.7 attackspambots
$f2bV_matches
2019-11-22 20:57:48

Recently Reported IPs

200.108.198.205 59.15.176.64 190.11.225.107 216.239.48.205
144.48.168.105 154.70.151.6 82.157.168.58 81.68.179.112
187.95.82.146 45.132.187.39 98.5.14.241 149.34.5.225
199.187.211.37 91.219.171.115 185.15.80.223 63.47.153.176
98.55.195.78 187.176.121.197 59.99.134.53 159.89.124.191