Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyiv

Region: Kyyiv

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.114.192.0 - 85.114.199.255'

% Abuse contact for '85.114.192.0 - 85.114.199.255' is 'abuse@vegatele.com'

inetnum:        85.114.192.0 - 85.114.199.255
netname:        VEGA-GPON-KYIV
country:        UA
admin-c:        GPON-RIPE
tech-c:         FLPI-RIPE
status:         ASSIGNED PA
mnt-by:         VEGA-UA-MNT
created:        2024-09-20T03:51:24Z
last-modified:  2024-09-20T03:51:24Z
source:         RIPE

role:           Farlep Invest PrJSC
remarks:        ******************************************************
remarks:        Farlep Invest PrJSC - ADMINISTRATIVE CONTACTS
remarks:        ******************************************************
address:        Farlep Invest PrJSC
address:        6 Gavela str.
address:        Kiev, 03680, Ukraine
abuse-mailbox:  abuse@vegatele.com
admin-c:        GIA-RIPE
tech-c:         FLPO-RIPE
nic-hdl:        FLPI-RIPE
mnt-by:         FARLEP-MNT
created:        2007-10-10T09:40:04Z
last-modified:  2023-08-23T17:37:17Z
source:         RIPE # Filtered

role:           VEGA-UA-RIPE
remarks:        Vega Telecom
address:        6 Gavela str., Kyiv, Ukraine
abuse-mailbox:  abuse@vegatele.com
nic-hdl:        GPON-RIPE
mnt-by:         VEGA-UA-MNT
created:        2024-06-11T18:08:12Z
last-modified:  2024-06-12T08:15:52Z
source:         RIPE # Filtered

% Information related to '85.114.192.0/21AS21497'

route:          85.114.192.0/21
origin:         AS21497
mnt-by:         VEGA-UA-MNT
created:        2024-09-20T03:51:46Z
last-modified:  2024-09-20T03:51:46Z
source:         RIPE

% Information related to '85.114.192.0/21AS34143'

route:          85.114.192.0/21
origin:         AS34143
mnt-by:         VEGA-UA-MNT
mnt-by:         GIA-MNT
created:        2025-06-17T11:00:26Z
last-modified:  2025-06-17T11:00:26Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122.1 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.114.199.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.114.199.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051400 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 00:01:11 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 56.199.114.85.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.199.114.85.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
24.243.178.126 attackspam
Chat Spam
2020-05-10 06:18:32
198.46.188.145 attack
May  9 22:12:50 ip-172-31-61-156 sshd[25457]: Failed password for lp from 198.46.188.145 port 58262 ssh2
May  9 22:17:55 ip-172-31-61-156 sshd[25667]: Invalid user filmlight from 198.46.188.145
May  9 22:17:55 ip-172-31-61-156 sshd[25667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.188.145
May  9 22:17:55 ip-172-31-61-156 sshd[25667]: Invalid user filmlight from 198.46.188.145
May  9 22:17:58 ip-172-31-61-156 sshd[25667]: Failed password for invalid user filmlight from 198.46.188.145 port 39590 ssh2
...
2020-05-10 06:44:22
134.122.124.193 attackbotsspam
5x Failed Password
2020-05-10 06:19:45
122.228.19.80 attackbotsspam
firewall-block, port(s): 49/tcp, 80/tcp, 995/tcp, 8649/tcp
2020-05-10 06:27:31
185.50.149.25 attack
May 10 00:26:10 takio postfix/submission/smtpd[16802]: lost connection after EHLO from unknown[185.50.149.25]
May 10 00:53:06 takio postfix/submission/smtpd[17585]: lost connection after EHLO from unknown[185.50.149.25]
May 10 01:38:48 takio postfix/submission/smtpd[18754]: lost connection after EHLO from unknown[185.50.149.25]
2020-05-10 06:52:49
180.190.183.26 attack
Automatic report - XMLRPC Attack
2020-05-10 06:42:11
179.184.57.194 attackbots
SSH Invalid Login
2020-05-10 06:30:14
185.50.149.17 attack
May 10 00:16:01 web01.agentur-b-2.de postfix/smtpd[448403]: warning: unknown[185.50.149.17]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 00:16:01 web01.agentur-b-2.de postfix/smtpd[448403]: lost connection after AUTH from unknown[185.50.149.17]
May 10 00:16:06 web01.agentur-b-2.de postfix/smtpd[448103]: lost connection after AUTH from unknown[185.50.149.17]
May 10 00:16:10 web01.agentur-b-2.de postfix/smtpd[448403]: lost connection after AUTH from unknown[185.50.149.17]
May 10 00:16:15 web01.agentur-b-2.de postfix/smtpd[448103]: lost connection after AUTH from unknown[185.50.149.17]
2020-05-10 06:33:57
210.245.110.9 attackbots
May 10 00:35:43 electroncash sshd[63059]: Invalid user teamspeak3 from 210.245.110.9 port 45931
May 10 00:35:43 electroncash sshd[63059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.110.9 
May 10 00:35:43 electroncash sshd[63059]: Invalid user teamspeak3 from 210.245.110.9 port 45931
May 10 00:35:45 electroncash sshd[63059]: Failed password for invalid user teamspeak3 from 210.245.110.9 port 45931 ssh2
May 10 00:40:01 electroncash sshd[64242]: Invalid user luke from 210.245.110.9 port 56237
...
2020-05-10 06:40:25
66.110.216.167 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-05-10 06:17:54
45.148.10.183 attackspambots
May  9 23:29:03 server2 sshd\[1235\]: User root from 45.148.10.183 not allowed because not listed in AllowUsers
May  9 23:29:04 server2 sshd\[1237\]: User root from 45.148.10.183 not allowed because not listed in AllowUsers
May  9 23:29:04 server2 sshd\[1239\]: Invalid user admin from 45.148.10.183
May  9 23:29:05 server2 sshd\[1241\]: Invalid user telnet from 45.148.10.183
May  9 23:29:06 server2 sshd\[1243\]: Invalid user ubnt from 45.148.10.183
May  9 23:29:08 server2 sshd\[1245\]: Invalid user user from 45.148.10.183
2020-05-10 06:29:02
113.59.224.45 attackspambots
Automatic report BANNED IP
2020-05-10 06:15:16
111.202.211.10 attackspambots
May 10 00:14:07 vps647732 sshd[22807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.202.211.10
May 10 00:14:08 vps647732 sshd[22807]: Failed password for invalid user newtemplate from 111.202.211.10 port 53742 ssh2
...
2020-05-10 06:20:20
178.128.221.85 attack
May 10 00:09:24 vps639187 sshd\[6605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.85  user=root
May 10 00:09:26 vps639187 sshd\[6605\]: Failed password for root from 178.128.221.85 port 52334 ssh2
May 10 00:13:36 vps639187 sshd\[6703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.85  user=root
...
2020-05-10 06:44:49
103.77.230.170 attackspambots
(smtpauth) Failed SMTP AUTH login from 103.77.230.170 (IN/India/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-10 00:59:07 plain authenticator failed for ([103.77.230.170]) [103.77.230.170]: 535 Incorrect authentication data (set_id=ravabet_omomi)
2020-05-10 06:28:01

Recently Reported IPs

38.213.189.161 104.140.148.82 110.78.156.76 2606:4700:10::6814:6733
2606:4700:10::6816:4050 70.163.96.162 66.54.164.54 59.23.37.244
34.156.69.46 67.215.232.98 211.101.239.232 94.26.106.30
66.249.69.13 34.162.207.34 31.70.83.43 211.101.234.56
39.154.17.31 39.154.15.214 39.149.214.96 39.148.59.115