Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Adana

Region: Adana

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: Turk Telekom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.105.91.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30389
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.105.91.122.			IN	A

;; AUTHORITY SECTION:
.			1246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052202 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 23 20:40:50 CST 2019
;; MSG SIZE  rcvd: 117

Host info
122.91.105.85.in-addr.arpa domain name pointer 85.105.91.122.static.ttnet.com.tr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
122.91.105.85.in-addr.arpa	name = 85.105.91.122.static.ttnet.com.tr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
123.108.249.82 attackspam
proto=tcp  .  spt=58911  .  dpt=25  .     (Found on   Dark List de Nov 19)     (645)
2019-11-20 06:57:59
96.87.16.153 attackspambots
proto=tcp  .  spt=57871  .  dpt=25  .     (Found on   Dark List de Nov 19)     (651)
2019-11-20 06:43:32
116.239.2.158 attackspambots
$f2bV_matches
2019-11-20 06:39:03
159.203.201.108 attack
scan z
2019-11-20 06:30:26
198.108.67.35 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-20 06:32:20
82.221.105.7 attack
Honeypot hit.
2019-11-20 06:43:47
148.70.23.131 attackbotsspam
Nov 19 22:52:31 hcbbdb sshd\[15772\]: Invalid user lefrou from 148.70.23.131
Nov 19 22:52:31 hcbbdb sshd\[15772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.131
Nov 19 22:52:33 hcbbdb sshd\[15772\]: Failed password for invalid user lefrou from 148.70.23.131 port 57451 ssh2
Nov 19 22:56:28 hcbbdb sshd\[16172\]: Invalid user karpan from 148.70.23.131
Nov 19 22:56:28 hcbbdb sshd\[16172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.131
2019-11-20 07:06:59
111.231.59.116 attack
Nov 19 22:04:48 localhost sshd\[10426\]: Invalid user northrup from 111.231.59.116 port 52912
Nov 19 22:04:48 localhost sshd\[10426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.59.116
Nov 19 22:04:50 localhost sshd\[10426\]: Failed password for invalid user northrup from 111.231.59.116 port 52912 ssh2
...
2019-11-20 06:57:43
49.51.13.40 attack
9083/tcp 33889/tcp 50070/tcp...
[2019-10-13/11-17]10pkt,10pt.(tcp)
2019-11-20 06:37:01
159.203.201.33 attack
8983/tcp 20110/tcp 1527/tcp...
[2019-09-18/11-19]59pkt,49pt.(tcp),2pt.(udp)
2019-11-20 06:31:42
188.166.42.50 attackspambots
Nov 19 23:20:07 relay postfix/smtpd\[18248\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 23:21:21 relay postfix/smtpd\[18247\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 23:21:54 relay postfix/smtpd\[15730\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 23:26:21 relay postfix/smtpd\[18247\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 23:35:33 relay postfix/smtpd\[18249\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-20 06:51:43
62.234.190.206 attackbotsspam
Tried sshing with brute force.
2019-11-20 06:30:47
211.157.148.2 attack
SSH Brute Force, server-1 sshd[22351]: Failed password for invalid user roth from 211.157.148.2 port 43509 ssh2
2019-11-20 07:05:20
136.243.247.44 attackbots
Port Scan: TCP/22
2019-11-20 06:30:12
123.20.59.43 attackbots
SSH Brute Force, server-1 sshd[21200]: Failed password for invalid user admin from 123.20.59.43 port 45143 ssh2
2019-11-20 07:07:17

Recently Reported IPs

221.32.120.143 211.9.99.105 132.197.29.105 130.93.28.245
102.101.59.48 50.35.1.176 169.12.242.242 69.136.128.102
2.83.30.58 1.150.71.35 214.206.111.108 193.185.68.243
126.77.107.164 52.240.173.234 27.135.11.124 123.174.8.208
132.227.144.182 221.71.242.46 5.39.95.228 81.179.25.43