Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.138.85.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33047
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.138.85.7.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100301 1800 900 604800 86400

;; Query time: 141 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 04 12:00:13 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 7.85.138.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.85.138.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.231.135.146 attackspambots
Aug 27 03:40:35 srv-4 sshd\[21035\]: Invalid user fm from 101.231.135.146
Aug 27 03:40:35 srv-4 sshd\[21035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.135.146
Aug 27 03:40:36 srv-4 sshd\[21035\]: Failed password for invalid user fm from 101.231.135.146 port 37280 ssh2
...
2019-08-27 11:57:57
173.212.219.135 attackspam
Aug 27 05:09:46 vps01 sshd[26428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.219.135
Aug 27 05:09:48 vps01 sshd[26428]: Failed password for invalid user zabbix from 173.212.219.135 port 60494 ssh2
2019-08-27 11:27:58
51.75.65.72 attackbotsspam
Aug 27 02:33:54 SilenceServices sshd[8082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.65.72
Aug 27 02:33:57 SilenceServices sshd[8082]: Failed password for invalid user swift from 51.75.65.72 port 49695 ssh2
Aug 27 02:38:02 SilenceServices sshd[9714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.65.72
2019-08-27 12:00:38
111.93.128.90 attackspambots
Aug 27 01:34:46 dev0-dcde-rnet sshd[2456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.128.90
Aug 27 01:34:48 dev0-dcde-rnet sshd[2456]: Failed password for invalid user spa from 111.93.128.90 port 2912 ssh2
Aug 27 01:38:43 dev0-dcde-rnet sshd[2481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.128.90
2019-08-27 11:33:22
178.212.11.149 attackspam
fail2ban honeypot
2019-08-27 11:47:35
132.145.163.250 attackspambots
Aug 26 15:28:02 hanapaa sshd\[13493\]: Invalid user mc from 132.145.163.250
Aug 26 15:28:02 hanapaa sshd\[13493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.163.250
Aug 26 15:28:05 hanapaa sshd\[13493\]: Failed password for invalid user mc from 132.145.163.250 port 56248 ssh2
Aug 26 15:32:15 hanapaa sshd\[13839\]: Invalid user teamspeak3 from 132.145.163.250
Aug 26 15:32:15 hanapaa sshd\[13839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.163.250
2019-08-27 11:59:01
23.129.64.180 attackspam
Aug 27 05:51:40 MK-Soft-Root2 sshd\[29330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.180  user=sshd
Aug 27 05:51:42 MK-Soft-Root2 sshd\[29330\]: Failed password for sshd from 23.129.64.180 port 52746 ssh2
Aug 27 05:51:44 MK-Soft-Root2 sshd\[29330\]: Failed password for sshd from 23.129.64.180 port 52746 ssh2
...
2019-08-27 12:07:03
45.119.83.62 attackspam
Aug 27 04:54:21 vps691689 sshd[19693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.62
Aug 27 04:54:23 vps691689 sshd[19693]: Failed password for invalid user osmc from 45.119.83.62 port 39068 ssh2
Aug 27 04:59:25 vps691689 sshd[19791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.62
...
2019-08-27 11:09:36
45.55.38.39 attackbots
Aug 26 14:39:26 web1 sshd\[16106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.38.39  user=root
Aug 26 14:39:27 web1 sshd\[16106\]: Failed password for root from 45.55.38.39 port 43799 ssh2
Aug 26 14:43:35 web1 sshd\[16504\]: Invalid user quinton from 45.55.38.39
Aug 26 14:43:35 web1 sshd\[16504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.38.39
Aug 26 14:43:37 web1 sshd\[16504\]: Failed password for invalid user quinton from 45.55.38.39 port 38835 ssh2
2019-08-27 11:48:31
107.170.209.246 attack
[munged]::443 107.170.209.246 - - [27/Aug/2019:03:22:44 +0200] "POST /[munged]: HTTP/1.1" 200 6160 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 107.170.209.246 - - [27/Aug/2019:03:22:47 +0200] "POST /[munged]: HTTP/1.1" 200 6165 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-27 11:06:38
94.177.163.134 attack
Aug 26 22:58:43 vps200512 sshd\[15437\]: Invalid user tss3 from 94.177.163.134
Aug 26 22:58:43 vps200512 sshd\[15437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.163.134
Aug 26 22:58:45 vps200512 sshd\[15437\]: Failed password for invalid user tss3 from 94.177.163.134 port 48676 ssh2
Aug 26 23:02:45 vps200512 sshd\[15565\]: Invalid user viktor from 94.177.163.134
Aug 26 23:02:45 vps200512 sshd\[15565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.163.134
2019-08-27 11:07:13
130.207.1.69 attack
Port scan on 1 port(s): 53
2019-08-27 11:50:22
92.53.90.212 attack
08/26/2019-20:56:34.568893 92.53.90.212 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-27 12:02:36
213.6.8.38 attackspambots
Aug 26 16:51:28 hanapaa sshd\[21375\]: Invalid user juancarlos from 213.6.8.38
Aug 26 16:51:28 hanapaa sshd\[21375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.8.38
Aug 26 16:51:30 hanapaa sshd\[21375\]: Failed password for invalid user juancarlos from 213.6.8.38 port 34484 ssh2
Aug 26 16:56:25 hanapaa sshd\[21762\]: Invalid user office from 213.6.8.38
Aug 26 16:56:25 hanapaa sshd\[21762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.8.38
2019-08-27 11:06:08
61.155.140.67 attackspam
fail2ban
2019-08-27 11:51:18

Recently Reported IPs

133.62.155.198 214.75.12.43 195.97.7.75 72.23.151.66
98.244.146.182 89.60.152.181 184.22.91.21 206.106.234.222
192.42.100.212 80.247.97.180 191.241.185.152 213.49.72.202
210.6.208.53 47.194.226.237 53.172.134.10 110.254.29.35
218.212.10.128 69.33.175.24 61.207.207.180 122.156.68.130