Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Tietong

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.85.222.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.85.222.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 17:58:21 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.222.85.122.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.222.85.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.196.223.50 attackspam
2020-01-06T22:14:09.250615suse-nuc sshd[11534]: Invalid user preche from 1.196.223.50 port 17192
...
2020-09-26 13:22:57
87.5.24.125 attackbots
87.5.24.125 - - [25/Sep/2020:21:29:02 +0100] "POST /wp-login.php HTTP/1.1" 200 8955 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
87.5.24.125 - - [25/Sep/2020:21:39:04 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
87.5.24.125 - - [25/Sep/2020:21:39:07 +0100] "POST /wp-login.php HTTP/1.1" 200 8955 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-09-26 13:37:52
1.1.233.241 attackbotsspam
2020-06-29T21:30:40.612065suse-nuc sshd[20228]: Invalid user dircreate from 1.1.233.241 port 50631
...
2020-09-26 14:02:37
1.171.19.44 attackbots
2020-05-23T07:55:56.026177suse-nuc sshd[13733]: Invalid user supervisor from 1.171.19.44 port 50081
...
2020-09-26 13:41:52
1.193.39.85 attackspam
2020-03-27T03:46:28.727326suse-nuc sshd[8093]: Invalid user xid from 1.193.39.85 port 47939
...
2020-09-26 13:28:08
1.1.132.69 attack
2019-11-27T01:38:44.085801suse-nuc sshd[24675]: Invalid user admin from 1.1.132.69 port 56311
...
2020-09-26 14:04:55
1.1.208.137 attack
2020-03-29T22:24:10.474458suse-nuc sshd[7131]: User root from 1.1.208.137 not allowed because listed in DenyUsers
...
2020-09-26 14:03:28
1.162.229.75 attackspam
2020-08-22T12:03:12.574478suse-nuc sshd[30352]: User root from 1.162.229.75 not allowed because listed in DenyUsers
...
2020-09-26 13:48:29
1.193.160.164 attackspam
Invalid user www from 1.193.160.164 port 51684
2020-09-26 13:28:47
1.119.44.250 attackspambots
2020-03-07T17:33:47.461003suse-nuc sshd[8491]: Invalid user 22 from 1.119.44.250 port 32796
...
2020-09-26 13:51:42
1.179.185.50 attackbots
Invalid user info from 1.179.185.50 port 43400
2020-09-26 13:36:08
1.179.146.156 attackbotsspam
2019-11-14T03:00:50.152624suse-nuc sshd[13750]: Invalid user freddy from 1.179.146.156 port 51428
...
2020-09-26 13:38:56
13.76.94.26 attackbotsspam
Sep 26 05:07:48 scw-tender-jepsen sshd[12497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.94.26
Sep 26 05:07:50 scw-tender-jepsen sshd[12497]: Failed password for invalid user admin from 13.76.94.26 port 16846 ssh2
2020-09-26 13:47:54
50.196.36.169 attackbots
Hits on port :
2020-09-26 13:53:44
1.1.214.95 attackbotsspam
2020-05-21T13:57:22.777218suse-nuc sshd[6015]: Invalid user admin from 1.1.214.95 port 43183
...
2020-09-26 14:03:10

Recently Reported IPs

226.155.87.23 13.40.100.26 36.58.153.183 48.139.69.250
249.241.107.187 117.109.143.81 135.211.140.15 181.162.4.222
192.139.197.220 83.188.148.126 29.215.4.69 44.247.90.22
160.134.113.222 190.26.90.248 24.52.53.162 130.171.36.153
241.238.30.149 37.92.141.117 184.235.17.250 126.150.173.7