Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Austin

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.214.85.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.214.85.60.			IN	A

;; AUTHORITY SECTION:
.			280	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022002 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:08:00 CST 2020
;; MSG SIZE  rcvd: 117
Host info
60.85.214.198.in-addr.arpa domain name pointer ip-198-214-85-60.utguest.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
60.85.214.198.in-addr.arpa	name = ip-198-214-85-60.utguest.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.164.33.229 attackbotsspam
Automatic report - Port Scan Attack
2019-11-16 13:34:09
54.39.193.26 attackspambots
$f2bV_matches
2019-11-16 13:46:15
149.56.44.101 attack
SSH Brute Force, server-1 sshd[30867]: Failed password for invalid user power from 149.56.44.101 port 48702 ssh2
2019-11-16 13:16:33
122.228.19.80 attackspambots
1604/udp 771/tcp 4500/udp...
[2019-09-15/11-16]1764pkt,283pt.(tcp),50pt.(udp)
2019-11-16 13:40:05
98.219.219.29 attackbotsspam
Automatic report - Port Scan Attack
2019-11-16 13:21:11
201.48.173.21 attackbotsspam
Nov 16 05:56:20 cvbnet sshd[11243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.173.21 
Nov 16 05:56:22 cvbnet sshd[11243]: Failed password for invalid user admin from 201.48.173.21 port 48450 ssh2
...
2019-11-16 13:12:33
185.176.27.86 attackbotsspam
33380/tcp 33382/tcp 33384/tcp...
[2019-09-15/11-16]908pkt,212pt.(tcp)
2019-11-16 13:38:56
129.204.23.233 attackspam
F2B jail: sshd. Time: 2019-11-16 06:12:03, Reported by: VKReport
2019-11-16 13:14:53
154.126.173.31 attack
19/11/15@23:56:19: FAIL: IoT-Telnet address from=154.126.173.31
...
2019-11-16 13:14:29
117.5.55.46 attackbots
failed_logins
2019-11-16 13:31:05
117.146.251.138 attackspambots
Fail2Ban Ban Triggered
2019-11-16 13:51:54
49.206.126.209 attackbots
Nov 16 05:45:02 thevastnessof sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.206.126.209
...
2019-11-16 13:50:54
198.108.66.176 attack
20000/tcp 8088/tcp 88/tcp...
[2019-09-22/11-16]17pkt,16pt.(tcp)
2019-11-16 13:17:49
198.108.67.50 attackspam
1167/tcp 9035/tcp 9104/tcp...
[2019-09-14/11-14]113pkt,108pt.(tcp)
2019-11-16 13:38:02
147.135.253.139 attackbots
Nov 15 05:47:00 iago sshd[30416]: Did not receive identification string from 147.135.253.139
Nov 15 05:49:25 iago sshd[30417]: Invalid user vagrant from 147.135.253.139


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=147.135.253.139
2019-11-16 13:20:04

Recently Reported IPs

64.188.199.208 24.32.2.88 183.7.178.145 1.193.178.108
68.109.82.201 205.185.115.36 86.72.125.227 91.122.213.250
109.235.82.249 63.69.167.221 51.91.105.120 152.250.196.100
223.166.205.105 181.16.214.210 213.238.250.205 186.51.69.178
85.99.54.43 193.119.56.28 132.226.90.145 211.15.197.54