Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Balıkesir

Region: Balıkesir

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: Turk Telekom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
85.107.245.250 attackbotsspam
Unauthorized connection attempt detected from IP address 85.107.245.250 to port 80
2020-07-09 06:04:00
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.107.245.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28064
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.107.245.39.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 23:09:06 CST 2019
;; MSG SIZE  rcvd: 117

Host info
39.245.107.85.in-addr.arpa domain name pointer 85.107.245.39.dynamic.ttnet.com.tr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
39.245.107.85.in-addr.arpa	name = 85.107.245.39.dynamic.ttnet.com.tr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
94.236.153.77 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-18 08:44:05
176.59.49.254 attackspambots
20/2/17@18:02:56: FAIL: Alarm-Network address from=176.59.49.254
20/2/17@18:02:56: FAIL: Alarm-Network address from=176.59.49.254
...
2020-02-18 08:32:40
77.138.254.154 attackbotsspam
5x Failed Password
2020-02-18 08:35:24
36.45.183.185 attackbotsspam
Port probing on unauthorized port 1433
2020-02-18 08:20:55
75.48.38.171 attack
2020-01-14T11:59:29.681687suse-nuc sshd[16999]: Invalid user lu from 75.48.38.171 port 48222
...
2020-02-18 08:55:33
75.80.193.222 attackbots
2020-01-14T23:23:06.990762suse-nuc sshd[19763]: Invalid user norman from 75.80.193.222 port 36889
...
2020-02-18 08:54:27
138.99.216.112 attackspam
SMTP Brute-Force
2020-02-18 08:53:32
222.127.30.130 attack
Feb 18 01:24:24 [munged] sshd[16597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.30.130
2020-02-18 08:46:53
77.20.168.148 attackspambots
2020-02-07T06:18:01.391487suse-nuc sshd[8914]: Invalid user hps from 77.20.168.148 port 55146
...
2020-02-18 08:29:11
41.224.241.19 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-18 08:35:54
91.203.193.85 attack
2020-02-18 08:39:14
77.181.141.5 attackbots
2019-12-03T06:06:41.629309suse-nuc sshd[24757]: Invalid user pi from 77.181.141.5 port 41100
2019-12-03T06:06:41.839000suse-nuc sshd[24758]: Invalid user pi from 77.181.141.5 port 41102
...
2020-02-18 08:30:22
76.127.18.95 attackspam
2019-12-31T20:01:59.627292suse-nuc sshd[6791]: Invalid user pi from 76.127.18.95 port 48122
...
2020-02-18 08:47:20
77.201.219.171 attackspam
2020-02-10T04:40:48.574136suse-nuc sshd[27700]: Invalid user glb from 77.201.219.171 port 58818
...
2020-02-18 08:27:22
60.6.182.51 attackspambots
DATE:2020-02-17 23:09:35, IP:60.6.182.51, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-02-18 08:49:58

Recently Reported IPs

89.59.70.162 94.225.108.208 214.6.144.253 131.183.165.40
17.59.222.57 82.153.194.204 80.165.88.254 201.140.210.2
106.199.186.202 184.155.106.219 186.196.170.42 137.32.193.91
54.162.197.20 84.133.84.249 126.0.20.123 176.111.215.175
175.248.94.38 1.242.67.58 201.58.187.217 98.83.3.193