Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.14.83.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.14.83.185.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011101 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 06:04:32 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 185.83.14.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.83.14.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.71.47.198 attackbotsspam
Invalid user adcuser from 180.71.47.198 port 54706
2019-10-30 23:22:23
81.22.45.65 attackbotsspam
2019-10-30T15:56:02.895779+01:00 lumpi kernel: [2269755.062466] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=26029 PROTO=TCP SPT=46347 DPT=40060 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-30 23:00:42
114.47.179.222 attackspambots
23/tcp
[2019-10-30]1pkt
2019-10-30 23:03:48
37.6.212.106 attackbots
23/tcp
[2019-10-30]1pkt
2019-10-30 23:01:47
45.82.32.132 attackbotsspam
Postfix RBL failed
2019-10-30 23:33:48
35.201.243.170 attackspambots
Oct 30 11:00:14 debian sshd\[15727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170  user=root
Oct 30 11:00:16 debian sshd\[15727\]: Failed password for root from 35.201.243.170 port 27786 ssh2
Oct 30 11:04:00 debian sshd\[15761\]: Invalid user yyy from 35.201.243.170 port 37802
...
2019-10-30 23:20:59
114.43.55.143 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/114.43.55.143/ 
 
 TW - 1H : (117)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.43.55.143 
 
 CIDR : 114.43.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 2 
  3H - 13 
  6H - 29 
 12H - 54 
 24H - 110 
 
 DateTime : 2019-10-30 12:52:01 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-30 23:11:57
190.137.235.86 attackspam
60001/tcp
[2019-10-30]1pkt
2019-10-30 23:10:54
36.84.63.251 attackspam
Automatic report - Port Scan Attack
2019-10-30 23:31:35
180.114.213.145 attackbotsspam
Oct 30 07:44:52 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:44:55 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:44:58 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:45:03 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:45:05 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.114.213.145
2019-10-30 23:32:14
78.137.6.18 attack
port scan and connect, tcp 23 (telnet)
2019-10-30 23:07:43
80.48.126.5 attackspambots
2019-10-30T14:34:34.277662abusebot-6.cloudsearch.cf sshd\[30501\]: Invalid user marivic from 80.48.126.5 port 41545
2019-10-30 23:47:31
188.18.53.48 attackbotsspam
Sniffing for wp-login
2019-10-30 23:09:59
177.42.5.126 attackspambots
23/tcp
[2019-10-30]1pkt
2019-10-30 23:31:16
45.82.153.35 attackbotsspam
firewall-block, port(s): 40987/tcp, 50980/tcp
2019-10-30 23:34:47

Recently Reported IPs

125.212.176.107 124.130.23.199 227.104.145.18 220.134.125.99
180.151.219.56 243.113.229.53 241.144.212.124 25.119.18.245
141.148.238.146 221.228.150.221 165.95.159.175 15.213.113.71
46.11.86.5 29.134.116.228 222.96.83.167 126.149.1.59
145.200.161.185 37.67.184.210 31.182.167.28 78.163.186.9