Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.242.214.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;63.242.214.85.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010701 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 08 06:21:55 CST 2020
;; MSG SIZE  rcvd: 117
Host info
85.214.242.63.in-addr.arpa domain name pointer 85.mucb.miam.philapaaz.dsl.att.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.214.242.63.in-addr.arpa	name = 85.mucb.miam.philapaaz.dsl.att.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.38.150.105 attackbots
GET /forum/ HTTP/1.0 302 - Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36 OPR/54.0.2952.71
2019-07-21 15:44:22
171.229.247.206 attackbotsspam
Telnet Server BruteForce Attack
2019-07-21 16:04:14
159.65.123.104 attackspam
firewall-block, port(s): 30001/tcp
2019-07-21 16:19:33
153.36.232.49 attack
2019-07-21T09:40:40.375857centos sshd\[1219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
2019-07-21T09:40:42.215770centos sshd\[1219\]: Failed password for root from 153.36.232.49 port 33791 ssh2
2019-07-21T09:40:48.495147centos sshd\[1222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
2019-07-21 15:49:43
189.211.85.194 attack
Jul 21 03:41:51 plusreed sshd[2396]: Invalid user hassan from 189.211.85.194
...
2019-07-21 15:56:19
202.169.246.204 attackspambots
Sat, 20 Jul 2019 21:53:40 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:35:32
213.185.163.124 attackbotsspam
Jul 21 10:40:53 hosting sshd[9484]: Invalid user mtr from 213.185.163.124 port 58410
...
2019-07-21 15:47:32
162.243.137.229 attack
RDP Scan
2019-07-21 16:13:34
138.204.186.27 attackspam
SMB Server BruteForce Attack
2019-07-21 16:00:40
132.247.192.249 attackspambots
445/tcp
[2019-07-21]1pkt
2019-07-21 15:47:59
114.164.69.114 attackbotsspam
Sat, 20 Jul 2019 21:53:42 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:22:47
59.8.120.30 attackbots
23/tcp
[2019-07-21]1pkt
2019-07-21 15:42:37
51.254.129.128 attackspam
Jul 21 10:06:24 vps647732 sshd[21070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.128
Jul 21 10:06:27 vps647732 sshd[21070]: Failed password for invalid user elsje from 51.254.129.128 port 49117 ssh2
...
2019-07-21 16:22:41
181.44.4.74 attackspambots
60001/tcp
[2019-07-21]1pkt
2019-07-21 15:59:34
27.50.24.83 attackbots
Jul 21 09:40:42 bouncer sshd\[16282\]: Invalid user cacti from 27.50.24.83 port 55026
Jul 21 09:40:42 bouncer sshd\[16282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.24.83 
Jul 21 09:40:43 bouncer sshd\[16282\]: Failed password for invalid user cacti from 27.50.24.83 port 55026 ssh2
...
2019-07-21 15:52:20

Recently Reported IPs

5.253.25.37 94.179.128.181 181.118.77.132 80.91.19.217
154.237.28.210 88.26.174.45 77.88.191.126 14.166.248.23
46.189.253.237 40.77.191.225 188.12.49.153 47.56.90.98
117.1.90.148 78.11.120.85 39.244.62.117 43.229.89.187
28.4.62.150 36.85.222.143 14.178.79.198 172.150.243.177