Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanqiao

Region: Shanghai

Country: China

Internet Service Provider: China Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.85.38.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.85.38.74.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022602 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 04:35:37 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 74.38.85.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.38.85.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.10.156 attack
2020-05-19T20:23:14Z - RDP login failed multiple times. (141.98.10.156)
2020-05-20 05:03:04
150.136.149.141 attackspambots
Error 404. The requested page (/horde/imp/test.php) was not found
2020-05-20 04:56:54
139.59.12.65 attackspambots
2020-05-19T18:45:30.575090shield sshd\[21236\]: Invalid user eks from 139.59.12.65 port 46662
2020-05-19T18:45:30.583429shield sshd\[21236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.12.65
2020-05-19T18:45:32.832531shield sshd\[21236\]: Failed password for invalid user eks from 139.59.12.65 port 46662 ssh2
2020-05-19T18:48:44.613407shield sshd\[21775\]: Invalid user kzy from 139.59.12.65 port 38718
2020-05-19T18:48:44.756997shield sshd\[21775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.12.65
2020-05-20 04:51:31
120.53.1.97 attackbotsspam
5x Failed Password
2020-05-20 04:49:20
87.251.174.193 attackbots
.
2020-05-20 04:53:53
180.94.170.39 attack
Port Scan
2020-05-20 04:53:36
222.186.173.226 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Failed password for root from 222.186.173.226 port 45660 ssh2
Failed password for root from 222.186.173.226 port 45660 ssh2
Failed password for root from 222.186.173.226 port 45660 ssh2
Failed password for root from 222.186.173.226 port 45660 ssh2
2020-05-20 04:33:47
27.150.22.44 attack
May 19 22:00:27 mail sshd[17784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.22.44 
May 19 22:00:30 mail sshd[17784]: Failed password for invalid user yrx from 27.150.22.44 port 47390 ssh2
...
2020-05-20 05:08:45
186.3.131.61 attackspambots
web-1 [ssh] SSH Attack
2020-05-20 04:51:54
118.71.165.125 attackspam
1589880798 - 05/19/2020 11:33:18 Host: 118.71.165.125/118.71.165.125 Port: 445 TCP Blocked
2020-05-20 04:38:34
89.148.9.123 attackspambots
Error 404. The requested page (/wp/wp-login.php) was not found
2020-05-20 05:04:22
144.91.99.244 attackbotsspam
Web App AttacK and Brute-force
2020-05-20 04:41:37
134.209.195.187 attackbotsspam
Malformed \x.. web request
2020-05-20 04:32:36
203.147.80.102 attackspambots
(imapd) Failed IMAP login from 203.147.80.102 (NC/New Caledonia/host-203-147-80-102.h33.canl.nc): 1 in the last 3600 secs
2020-05-20 04:56:06
190.52.191.49 attackspam
Invalid user udq from 190.52.191.49 port 46064
2020-05-20 04:36:47

Recently Reported IPs

27.2.209.208 155.92.247.76 100.28.127.39 181.28.249.199
5.156.135.218 178.192.238.129 51.107.98.148 223.202.225.92
211.205.202.53 73.66.93.2 68.207.160.188 98.125.223.58
1.233.7.179 186.9.53.90 116.255.93.79 60.109.23.243
220.255.21.25 91.16.217.112 180.245.213.8 72.135.18.196