Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: Türk Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.109.213.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.109.213.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121700 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 13:48:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
94.213.109.85.in-addr.arpa domain name pointer 85.109.213.94.dynamic.ttnet.com.tr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.213.109.85.in-addr.arpa	name = 85.109.213.94.dynamic.ttnet.com.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.43.82.242 attack
SSH Brute-Force reported by Fail2Ban
2019-07-27 16:38:14
210.217.24.254 attackspam
ssh failed login
2019-07-27 16:38:51
178.62.33.138 attackspam
Jul 27 08:57:35 mail sshd\[29927\]: Invalid user jonjon from 178.62.33.138 port 56014
Jul 27 08:57:35 mail sshd\[29927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138
Jul 27 08:57:37 mail sshd\[29927\]: Failed password for invalid user jonjon from 178.62.33.138 port 56014 ssh2
Jul 27 09:01:48 mail sshd\[30877\]: Invalid user longhua_5468 from 178.62.33.138 port 50618
Jul 27 09:01:48 mail sshd\[30877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138
2019-07-27 16:45:59
118.70.13.48 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-27 17:04:12
91.239.152.130 attackbotsspam
Rude login attack (2 tries in 1d)
2019-07-27 16:27:46
35.240.139.42 attack
Jul 27 08:12:09 localhost sshd\[53702\]: Invalid user sh3ll from 35.240.139.42 port 63816
Jul 27 08:12:09 localhost sshd\[53702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.139.42
Jul 27 08:12:11 localhost sshd\[53702\]: Failed password for invalid user sh3ll from 35.240.139.42 port 63816 ssh2
Jul 27 08:17:32 localhost sshd\[53864\]: Invalid user cocopuff from 35.240.139.42 port 10214
Jul 27 08:17:32 localhost sshd\[53864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.139.42
...
2019-07-27 16:33:17
192.207.205.98 attackbotsspam
Jul 27 06:47:34 localhost sshd\[51115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.207.205.98  user=root
Jul 27 06:47:35 localhost sshd\[51115\]: Failed password for root from 192.207.205.98 port 31148 ssh2
Jul 27 06:52:27 localhost sshd\[51225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.207.205.98  user=root
Jul 27 06:52:29 localhost sshd\[51225\]: Failed password for root from 192.207.205.98 port 26706 ssh2
Jul 27 06:57:17 localhost sshd\[51452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.207.205.98  user=root
...
2019-07-27 16:57:12
27.50.165.46 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-27 16:39:28
202.29.30.204 attack
villaromeo.de 202.29.30.204 \[27/Jul/2019:07:10:47 +0200\] "POST /wp-login.php HTTP/1.1" 200 2061 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
villaromeo.de 202.29.30.204 \[27/Jul/2019:07:10:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 2066 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-27 16:35:35
192.241.204.70 attackbotsspam
firewall-block, port(s): 9529/tcp
2019-07-27 16:47:12
113.185.19.242 attackspam
Automated report - ssh fail2ban:
Jul 27 10:35:15 authentication failure 
Jul 27 10:35:16 wrong password, user=admin, port=30566, ssh2
Jul 27 10:40:41 authentication failure
2019-07-27 17:08:46
193.32.163.182 attackbotsspam
Jul 27 10:41:18 host sshd\[33693\]: Invalid user admin from 193.32.163.182 port 46402
Jul 27 10:41:18 host sshd\[33693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
...
2019-07-27 16:43:23
89.122.232.201 attack
Automatic report - Port Scan Attack
2019-07-27 16:28:09
171.236.251.176 attackspam
Brute force attempt
2019-07-27 16:31:02
200.199.6.204 attack
Jul 27 10:24:26 lnxded63 sshd[10856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.6.204
2019-07-27 16:34:08

Recently Reported IPs

135.203.240.227 34.207.10.43 156.175.153.7 53.47.241.153
39.100.220.93 173.110.60.111 187.230.226.105 0.233.72.116
67.242.15.225 66.219.53.10 121.179.79.146 195.64.249.205
232.238.36.181 253.242.56.15 195.64.212.12 160.245.206.89
187.137.76.189 229.246.153.236 120.198.91.246 176.226.109.40