Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.214.106.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.214.106.20.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010602 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 07 06:31:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
20.106.214.85.in-addr.arpa domain name pointer h2853112.stratoserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.106.214.85.in-addr.arpa	name = h2853112.stratoserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.52.156.13 attackspam
Unauthorized connection attempt detected from IP address 119.52.156.13 to port 2323 [T]
2020-05-09 04:43:23
103.91.209.111 attackspam
Unauthorized connection attempt detected from IP address 103.91.209.111 to port 3389 [T]
2020-05-09 04:12:11
60.174.21.251 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 46 - port: 23 proto: TCP cat: Misc Attack
2020-05-09 04:17:13
164.52.24.180 attackbots
90/tcp 311/tcp 389/udp...
[2020-03-09/05-08]22pkt,6pt.(tcp),2pt.(udp)
2020-05-09 04:39:19
218.93.150.222 attackbots
Unauthorized connection attempt detected from IP address 218.93.150.222 to port 1433 [T]
2020-05-09 04:30:41
106.12.36.42 attack
May  8 18:12:15 *** sshd[13648]: Invalid user marcel from 106.12.36.42
2020-05-09 04:11:43
61.162.212.10 attackbotsspam
Unauthorized connection attempt detected from IP address 61.162.212.10 to port 23 [T]
2020-05-09 04:16:04
14.127.243.223 attackbots
Port scan on 1 port(s): 4899
2020-05-09 04:27:55
150.249.168.234 attackbotsspam
Unauthorized connection attempt detected from IP address 150.249.168.234 to port 81 [T]
2020-05-09 04:39:35
106.75.7.109 attackbots
Unauthorized connection attempt detected from IP address 106.75.7.109 to port 666 [T]
2020-05-09 04:11:18
123.56.68.119 attack
Unauthorized connection attempt detected from IP address 123.56.68.119 to port 23 [T]
2020-05-09 04:41:46
124.205.131.139 attackbots
Unauthorized connection attempt detected from IP address 124.205.131.139 to port 1433 [T]
2020-05-09 04:40:14
171.217.147.170 attackspam
Unauthorized connection attempt detected from IP address 171.217.147.170 to port 23 [T]
2020-05-09 04:37:49
208.117.222.174 attackbotsspam
Unauthorized connection attempt detected from IP address 208.117.222.174 to port 23 [T]
2020-05-09 04:32:02
221.213.75.154 attackbots
Unauthorized connection attempt detected from IP address 221.213.75.154 to port 9653 [T]
2020-05-09 04:29:08

Recently Reported IPs

78.100.24.179 134.12.92.195 98.191.72.207 156.183.233.143
140.243.231.176 51.195.5.155 39.254.214.143 79.19.80.72
37.210.163.49 229.52.128.22 157.149.164.105 209.2.106.202
177.27.103.241 62.149.21.243 85.12.234.112 10.105.41.109
99.89.42.110 58.192.124.58 178.62.39.227 229.225.103.88