Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Tbilisi

Country: Georgia

Internet Service Provider: Magti

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.114.226.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.114.226.14.			IN	A

;; AUTHORITY SECTION:
.			490	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 14:15:08 CST 2022
;; MSG SIZE  rcvd: 106
Host info
14.226.114.85.in-addr.arpa domain name pointer host-85-114-226-14.customer.magticom.ge.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.226.114.85.in-addr.arpa	name = host-85-114-226-14.customer.magticom.ge.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
208.68.39.220 attack
Port scan denied
2020-07-27 22:58:39
80.13.94.95 attackbots
20/7/27@07:54:33: FAIL: Alarm-Network address from=80.13.94.95
...
2020-07-27 22:51:46
51.83.99.228 attack
frenzy
2020-07-27 23:13:05
189.136.136.106 attackspam
Port probing on unauthorized port 445
2020-07-27 22:58:08
58.87.78.55 attack
2020-07-27T12:27:23.405893shield sshd\[31988\]: Invalid user jasper from 58.87.78.55 port 34774
2020-07-27T12:27:23.415341shield sshd\[31988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.78.55
2020-07-27T12:27:25.312901shield sshd\[31988\]: Failed password for invalid user jasper from 58.87.78.55 port 34774 ssh2
2020-07-27T12:32:01.958118shield sshd\[779\]: Invalid user bftp from 58.87.78.55 port 56838
2020-07-27T12:32:01.967489shield sshd\[779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.78.55
2020-07-27 23:01:51
106.53.108.16 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-27 23:01:24
122.202.48.251 attack
reported through recidive - multiple failed attempts(SSH)
2020-07-27 22:58:21
64.225.102.125 attackspambots
Fail2Ban Ban Triggered
2020-07-27 22:54:15
220.177.92.227 attackbotsspam
Invalid user sftp from 220.177.92.227 port 17059
2020-07-27 23:06:59
128.199.202.206 attack
IP blocked
2020-07-27 23:14:15
84.242.176.138 attackbots
Port scanning [2 denied]
2020-07-27 23:12:23
162.247.74.201 attackspam
handydirektreparatur.de 162.247.74.201 [27/Jul/2020:13:53:35 +0200] "POST /xmlrpc.php HTTP/1.0" 301 521 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
www.handydirektreparatur.de 162.247.74.201 [27/Jul/2020:13:53:37 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
2020-07-27 23:23:08
181.48.139.118 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-27 22:44:44
45.4.5.221 attackspam
$f2bV_matches
2020-07-27 22:45:26
45.145.185.25 attack
45.145.185.25 - - [27/Jul/2020:18:40:46 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-07-27 22:50:21

Recently Reported IPs

190.201.92.65 185.1.52.205 94.125.43.208 87.132.104.48
107.189.30.59 12.229.15.1 209.2.242.215 61.85.1.17
59.47.97.120 61.45.88.156 138.117.85.99 183.63.253.233
150.146.115.61 33.43.244.214 180.110.194.68 242.247.102.12
238.62.77.128 227.96.199.12 229.184.240.213 35.127.245.15