Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Istanbul

Region: Istanbul

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: Turk Telekom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
85.105.164.130 attack
Unauthorized connection attempt from IP address 85.105.164.130 on Port 445(SMB)
2019-09-06 10:48:34
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.105.164.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30259
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.105.164.54.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041101 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 11 18:10:28 +08 2019
;; MSG SIZE  rcvd: 117

Host info
54.164.105.85.in-addr.arpa domain name pointer 85.105.164.54.static.ttnet.com.tr.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
54.164.105.85.in-addr.arpa	name = 85.105.164.54.static.ttnet.com.tr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
134.122.93.17 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 01:44:14
118.89.234.161 attackspambots
frenzy
2020-08-11 01:42:47
221.122.67.66 attackspam
Aug 10 15:14:26 OPSO sshd\[17133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66  user=root
Aug 10 15:14:28 OPSO sshd\[17133\]: Failed password for root from 221.122.67.66 port 58888 ssh2
Aug 10 15:17:48 OPSO sshd\[17750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66  user=root
Aug 10 15:17:50 OPSO sshd\[17750\]: Failed password for root from 221.122.67.66 port 48031 ssh2
Aug 10 15:21:08 OPSO sshd\[18240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66  user=root
2020-08-11 01:39:40
117.50.99.197 attackbotsspam
Aug 10 14:45:22 ws12vmsma01 sshd[51801]: Failed password for root from 117.50.99.197 port 36602 ssh2
Aug 10 14:49:49 ws12vmsma01 sshd[52535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.197  user=root
Aug 10 14:49:51 ws12vmsma01 sshd[52535]: Failed password for root from 117.50.99.197 port 43284 ssh2
...
2020-08-11 01:52:51
161.189.108.119 attackbots
Bruteforce detected by fail2ban
2020-08-11 01:30:39
106.13.61.165 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 01:26:55
179.96.151.120 attackbots
$f2bV_matches
2020-08-11 01:39:10
185.132.53.54 attack
(Aug 10)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=52018 TCP DPT=8080 WINDOW=40367 SYN 
 (Aug 10)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=42267 TCP DPT=8080 WINDOW=23919 SYN 
 (Aug 10)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=43540 TCP DPT=8080 WINDOW=22119 SYN 
 (Aug 10)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=54338 TCP DPT=8080 WINDOW=21607 SYN 
 (Aug 10)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=45660 TCP DPT=8080 WINDOW=40366 SYN 
 (Aug 10)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=24222 TCP DPT=8080 WINDOW=22119 SYN 
 (Aug  9)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=38938 TCP DPT=8080 WINDOW=40367 SYN 
 (Aug  9)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=49332 TCP DPT=8080 WINDOW=25175 SYN 
 (Aug  9)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=9585 TCP DPT=8080 WINDOW=22119 SYN 
 (Aug  9)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=55859 TCP DPT=23 WINDOW=39599 SYN 
 (Aug  9)  LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=656 TCP DPT=23 WINDOW=17783 SYN
2020-08-11 01:26:26
41.227.24.194 attackspam
Unauthorized connection attempt from IP address 41.227.24.194 on Port 445(SMB)
2020-08-11 02:05:12
51.68.44.154 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 01:32:09
5.135.185.27 attack
Failed password for root from 5.135.185.27 port 37032 ssh2
2020-08-11 01:43:29
109.134.113.102 attackspambots
SSH break in attempt
...
2020-08-11 02:03:03
64.119.197.105 attackbots
Email login attempts - missing mail login name (IMAP)
2020-08-11 01:31:51
83.97.20.31 attack
 TCP (SYN) 83.97.20.31:35326 -> port 7547, len 44
2020-08-11 02:04:52
142.93.201.112 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-11 01:25:04

Recently Reported IPs

58.187.166.48 89.119.86.156 115.55.71.142 110.137.44.211
14.245.243.95 185.200.118.66 81.213.127.234 180.243.70.43
193.42.107.215 112.202.253.223 101.53.17.114 103.78.159.148
188.191.161.137 156.223.1.177 117.6.133.222 91.93.178.62
115.72.145.90 173.208.130.202 157.230.142.114 176.59.96.151