Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.214.85.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23735
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.214.85.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 16:34:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
104.85.214.163.in-addr.arpa domain name pointer dhcp-163-214-85-104.dent.agu.ac.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.85.214.163.in-addr.arpa	name = dhcp-163-214-85-104.dent.agu.ac.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
67.205.10.104 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-04-04 18:01:52
195.97.75.174 attackbots
Invalid user paul from 195.97.75.174 port 34362
2020-04-04 17:44:25
89.163.224.164 attack
[portscan] tcp/22 [SSH]
*(RWIN=65535)(04041152)
2020-04-04 17:50:24
74.122.121.110 attackspambots
1585972419 - 04/04/2020 05:53:39 Host: 74.122.121.110/74.122.121.110 Port: 445 TCP Blocked
2020-04-04 18:05:21
128.199.133.201 attackbotsspam
k+ssh-bruteforce
2020-04-04 17:51:49
2.179.235.122 attack
Unauthorised access (Apr  4) SRC=2.179.235.122 LEN=40 TTL=53 ID=60036 TCP DPT=8080 WINDOW=4541 SYN
2020-04-04 17:29:30
206.174.214.90 attackspam
(sshd) Failed SSH login from 206.174.214.90 (CA/Canada/h206-174-214-90.bigpipeinc.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  4 10:27:57 amsweb01 sshd[31717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.174.214.90  user=root
Apr  4 10:27:59 amsweb01 sshd[31717]: Failed password for root from 206.174.214.90 port 48756 ssh2
Apr  4 10:32:19 amsweb01 sshd[32281]: Invalid user zhucm from 206.174.214.90 port 51918
Apr  4 10:32:22 amsweb01 sshd[32281]: Failed password for invalid user zhucm from 206.174.214.90 port 51918 ssh2
Apr  4 10:34:34 amsweb01 sshd[32647]: Invalid user xiaoyan from 206.174.214.90 port 35008
2020-04-04 17:33:09
141.98.90.216 attack
(smtpauth) Failed SMTP AUTH login from 141.98.90.216 (GB/United Kingdom/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-04 13:05:36 login authenticator failed for (ADMIN) [141.98.90.216]: 535 Incorrect authentication data (set_id=info@taninsanat.com)
2020-04-04 18:02:41
138.19.25.251 attackspam
Apr  4 00:46:51 NPSTNNYC01T sshd[27112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.19.25.251
Apr  4 00:46:54 NPSTNNYC01T sshd[27112]: Failed password for invalid user user15 from 138.19.25.251 port 41480 ssh2
Apr  4 00:50:38 NPSTNNYC01T sshd[27403]: Failed password for root from 138.19.25.251 port 38007 ssh2
...
2020-04-04 17:57:21
223.105.4.250 attack
IP blocked
2020-04-04 17:21:16
183.82.36.44 attack
Apr  4 03:52:11 server1 sshd\[17290\]: Invalid user www from 183.82.36.44
Apr  4 03:52:11 server1 sshd\[17290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.36.44 
Apr  4 03:52:13 server1 sshd\[17290\]: Failed password for invalid user www from 183.82.36.44 port 53022 ssh2
Apr  4 03:58:11 server1 sshd\[19844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.36.44  user=root
Apr  4 03:58:13 server1 sshd\[19844\]: Failed password for root from 183.82.36.44 port 35148 ssh2
...
2020-04-04 17:58:53
80.254.124.137 attackspambots
Apr  4 09:58:56 markkoudstaal sshd[13829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.254.124.137
Apr  4 09:58:58 markkoudstaal sshd[13829]: Failed password for invalid user lishuai from 80.254.124.137 port 52252 ssh2
Apr  4 10:03:11 markkoudstaal sshd[14479]: Failed password for root from 80.254.124.137 port 32860 ssh2
2020-04-04 17:19:33
218.59.139.12 attack
Apr  4 11:22:42 localhost sshd\[7255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.59.139.12  user=root
Apr  4 11:22:44 localhost sshd\[7255\]: Failed password for root from 218.59.139.12 port 47688 ssh2
Apr  4 11:24:56 localhost sshd\[7297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.59.139.12  user=root
Apr  4 11:24:58 localhost sshd\[7297\]: Failed password for root from 218.59.139.12 port 33035 ssh2
Apr  4 11:27:10 localhost sshd\[7501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.59.139.12  user=root
...
2020-04-04 17:41:04
198.50.151.126 attackbots
$f2bV_matches
2020-04-04 17:47:57
79.120.118.82 attack
Apr  4 11:26:36 OPSO sshd\[12509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82  user=root
Apr  4 11:26:38 OPSO sshd\[12509\]: Failed password for root from 79.120.118.82 port 43856 ssh2
Apr  4 11:30:41 OPSO sshd\[13631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82  user=root
Apr  4 11:30:43 OPSO sshd\[13631\]: Failed password for root from 79.120.118.82 port 49371 ssh2
Apr  4 11:34:53 OPSO sshd\[14290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82  user=root
2020-04-04 17:39:06

Recently Reported IPs

182.240.199.84 93.235.103.208 135.147.50.163 110.120.214.170
33.129.118.231 74.129.193.36 78.198.96.178 215.128.114.238
220.172.119.151 96.253.191.0 150.62.159.212 143.230.149.131
153.93.148.214 149.76.2.196 25.183.16.214 138.125.6.170
173.54.143.242 53.169.101.7 173.169.241.212 72.99.247.180