Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.116.114.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.116.114.85.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 19:21:13 CST 2025
;; MSG SIZE  rcvd: 105
Host info
85.114.116.2.in-addr.arpa domain name pointer host-2-116-114-85.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.114.116.2.in-addr.arpa	name = host-2-116-114-85.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.248.81.104 attackbotsspam
02/09/2020-14:33:00.112197 104.248.81.104 Protocol: 6 ET CHAT IRC PING command
2020-02-10 02:20:27
200.111.176.225 attack
Unauthorized connection attempt from IP address 200.111.176.225 on Port 445(SMB)
2020-02-10 02:21:34
171.246.221.19 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-10 01:45:58
24.4.120.241 attackbots
Port probing on unauthorized port 23
2020-02-10 01:59:55
140.143.22.200 attackspambots
Feb  9 07:48:56 hpm sshd\[15828\]: Invalid user pkx from 140.143.22.200
Feb  9 07:48:56 hpm sshd\[15828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.22.200
Feb  9 07:48:59 hpm sshd\[15828\]: Failed password for invalid user pkx from 140.143.22.200 port 40972 ssh2
Feb  9 07:52:53 hpm sshd\[16336\]: Invalid user zca from 140.143.22.200
Feb  9 07:52:53 hpm sshd\[16336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.22.200
2020-02-10 02:03:47
51.91.218.189 attackbots
2020-02-09T16:33:56.782499vps773228.ovh.net sshd[32210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3158119.ip-51-91-218.eu
2020-02-09T16:33:56.767618vps773228.ovh.net sshd[32210]: Invalid user nexus from 51.91.218.189 port 40932
2020-02-09T16:33:58.933613vps773228.ovh.net sshd[32210]: Failed password for invalid user nexus from 51.91.218.189 port 40932 ssh2
2020-02-09T17:33:59.556220vps773228.ovh.net sshd[32394]: Invalid user user from 51.91.218.189 port 45884
2020-02-09T17:33:59.571016vps773228.ovh.net sshd[32394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3158119.ip-51-91-218.eu
2020-02-09T17:33:59.556220vps773228.ovh.net sshd[32394]: Invalid user user from 51.91.218.189 port 45884
2020-02-09T17:34:01.344772vps773228.ovh.net sshd[32394]: Failed password for invalid user user from 51.91.218.189 port 45884 ssh2
2020-02-09T17:34:17.717620vps773228.ovh.net sshd[32396]: Invalid user user from 5
...
2020-02-10 02:24:34
139.59.136.64 attackspam
Automatic report - Banned IP Access
2020-02-10 02:11:31
60.249.249.201 attackspambots
Unauthorized connection attempt from IP address 60.249.249.201 on Port 445(SMB)
2020-02-10 02:27:31
8.209.73.223 attack
SSH bruteforce
2020-02-10 01:46:28
179.184.8.142 attackbots
5x Failed Password
2020-02-10 02:05:53
112.215.209.79 attackbots
Unauthorized connection attempt from IP address 112.215.209.79 on Port 445(SMB)
2020-02-10 02:12:55
128.70.106.123 attack
SSH Brute Force
2020-02-10 02:28:25
95.190.224.185 attackspambots
Unauthorized connection attempt from IP address 95.190.224.185 on Port 445(SMB)
2020-02-10 02:02:58
36.234.207.195 attack
Telnet Server BruteForce Attack
2020-02-10 01:48:01
27.71.224.2 attackbots
2020-02-09T15:52:38.363046scmdmz1 sshd[13371]: Invalid user csy from 27.71.224.2 port 35742
2020-02-09T15:52:38.366028scmdmz1 sshd[13371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.224.2
2020-02-09T15:52:38.363046scmdmz1 sshd[13371]: Invalid user csy from 27.71.224.2 port 35742
2020-02-09T15:52:40.315895scmdmz1 sshd[13371]: Failed password for invalid user csy from 27.71.224.2 port 35742 ssh2
2020-02-09T15:56:26.172000scmdmz1 sshd[13724]: Invalid user rmm from 27.71.224.2 port 33244
...
2020-02-10 02:07:50

Recently Reported IPs

109.152.115.28 211.6.137.208 250.116.217.179 81.155.23.178
197.108.216.204 208.10.122.3 246.214.216.221 69.163.151.95
104.217.104.41 229.201.113.215 219.219.49.29 27.135.130.140
115.24.227.153 194.12.211.229 61.146.8.164 128.15.8.187
103.139.224.31 220.116.217.119 211.114.34.100 14.143.102.255