Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockton

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.85.64.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.85.64.51.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010201 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 06:51:09 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 51.64.85.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.64.85.214.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.184 attackbots
Jul 16 17:51:16 ajax sshd[27410]: Failed password for root from 218.92.0.184 port 3721 ssh2
Jul 16 17:51:21 ajax sshd[27410]: Failed password for root from 218.92.0.184 port 3721 ssh2
2020-07-17 00:54:36
185.220.101.166 attackbotsspam
20 attempts against mh_ha-misbehave-ban on oak
2020-07-17 00:30:24
23.97.48.168 attackspambots
Jul 16 12:50:03 Ubuntu-1404-trusty-64-minimal sshd\[7620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.48.168  user=root
Jul 16 12:50:05 Ubuntu-1404-trusty-64-minimal sshd\[7620\]: Failed password for root from 23.97.48.168 port 15643 ssh2
Jul 16 16:03:08 Ubuntu-1404-trusty-64-minimal sshd\[27113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.48.168  user=root
Jul 16 16:03:10 Ubuntu-1404-trusty-64-minimal sshd\[27113\]: Failed password for root from 23.97.48.168 port 19769 ssh2
Jul 16 17:36:03 Ubuntu-1404-trusty-64-minimal sshd\[2999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.48.168  user=root
2020-07-17 01:03:09
79.8.196.108 attackbotsspam
Invalid user sport from 79.8.196.108 port 52345
2020-07-17 00:32:44
37.59.161.115 attack
Invalid user ivan from 37.59.161.115 port 35229
2020-07-17 00:30:56
112.85.42.180 attack
Jul 16 16:48:48 scw-6657dc sshd[5299]: Failed password for root from 112.85.42.180 port 59526 ssh2
Jul 16 16:48:48 scw-6657dc sshd[5299]: Failed password for root from 112.85.42.180 port 59526 ssh2
Jul 16 16:48:51 scw-6657dc sshd[5299]: Failed password for root from 112.85.42.180 port 59526 ssh2
...
2020-07-17 00:55:48
47.240.168.184 attack
Telnet Server BruteForce Attack
2020-07-17 00:51:37
222.186.190.14 attackbotsspam
2020-07-16T16:51:33.181813abusebot.cloudsearch.cf sshd[23046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
2020-07-16T16:51:35.309684abusebot.cloudsearch.cf sshd[23046]: Failed password for root from 222.186.190.14 port 15081 ssh2
2020-07-16T16:51:37.197964abusebot.cloudsearch.cf sshd[23046]: Failed password for root from 222.186.190.14 port 15081 ssh2
2020-07-16T16:51:33.181813abusebot.cloudsearch.cf sshd[23046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
2020-07-16T16:51:35.309684abusebot.cloudsearch.cf sshd[23046]: Failed password for root from 222.186.190.14 port 15081 ssh2
2020-07-16T16:51:37.197964abusebot.cloudsearch.cf sshd[23046]: Failed password for root from 222.186.190.14 port 15081 ssh2
2020-07-16T16:51:33.181813abusebot.cloudsearch.cf sshd[23046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost
...
2020-07-17 00:56:48
222.186.30.59 attack
Jul 16 21:32:06 gw1 sshd[11961]: Failed password for root from 222.186.30.59 port 42568 ssh2
...
2020-07-17 00:33:57
34.221.126.11 attackspambots
2020-07-16T11:17:37.996932morrigan.ad5gb.com sshd[96520]: Failed password for invalid user tf2server from 34.221.126.11 port 51350 ssh2
2020-07-16T11:17:38.150687morrigan.ad5gb.com sshd[96520]: Disconnected from invalid user tf2server 34.221.126.11 port 51350 [preauth]
2020-07-17 00:33:19
92.38.148.51 attack
Brute forcing email accounts
2020-07-17 00:57:40
43.254.220.207 attackspambots
k+ssh-bruteforce
2020-07-17 01:00:51
185.143.73.134 attackspam
2020-07-16 16:41:29 auth_plain authenticator failed for (User) [185.143.73.134]: 535 Incorrect authentication data (set_id=bessie@mail.csmailer.org)
2020-07-16 16:41:57 auth_plain authenticator failed for (User) [185.143.73.134]: 535 Incorrect authentication data (set_id=judas@mail.csmailer.org)
2020-07-16 16:42:24 auth_plain authenticator failed for (User) [185.143.73.134]: 535 Incorrect authentication data (set_id=milli@mail.csmailer.org)
2020-07-16 16:42:52 auth_plain authenticator failed for (User) [185.143.73.134]: 535 Incorrect authentication data (set_id=Body@mail.csmailer.org)
2020-07-16 16:43:19 auth_plain authenticator failed for (User) [185.143.73.134]: 535 Incorrect authentication data (set_id=others@mail.csmailer.org)
...
2020-07-17 00:42:02
193.202.80.134 attack
Forbidden access
2020-07-17 00:41:33
36.250.229.115 attackspam
Jul 16 18:52:57 PorscheCustomer sshd[6654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.250.229.115
Jul 16 18:52:59 PorscheCustomer sshd[6654]: Failed password for invalid user sandbox from 36.250.229.115 port 58946 ssh2
Jul 16 18:57:38 PorscheCustomer sshd[6763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.250.229.115
...
2020-07-17 01:04:29

Recently Reported IPs

140.180.255.165 56.162.141.206 82.193.153.69 84.15.125.207
41.238.182.58 56.203.175.139 35.252.64.168 234.177.124.219
92.133.176.84 70.228.235.154 155.0.162.229 179.145.216.50
68.249.5.33 12.139.54.49 202.131.240.6 210.71.69.255
22.186.221.0 181.246.0.2 237.62.63.201 214.253.200.94