Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Diyarbakır

Region: Diyarbakir

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: Turk Telekom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.97.150.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60592
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.97.150.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 07 11:46:51 +08 2019
;; MSG SIZE  rcvd: 116

Host info
21.150.97.85.in-addr.arpa domain name pointer 85.97.150.21.dynamic.ttnet.com.tr.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
21.150.97.85.in-addr.arpa	name = 85.97.150.21.dynamic.ttnet.com.tr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.117 attackbots
Sep 16 08:06:44 ny01 sshd[30373]: Failed password for root from 49.88.112.117 port 61193 ssh2
Sep 16 08:07:56 ny01 sshd[30526]: Failed password for root from 49.88.112.117 port 24606 ssh2
2020-09-16 20:38:28
182.122.65.197 attack
Sep 15 05:59:13 xxxxxxx9247313 sshd[1308]: Invalid user nagios from 182.122.65.197
Sep 15 05:59:13 xxxxxxx9247313 sshd[1308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.65.197 
Sep 15 05:59:15 xxxxxxx9247313 sshd[1308]: Failed password for invalid user nagios from 182.122.65.197 port 33158 ssh2
Sep 15 06:03:17 xxxxxxx9247313 sshd[1445]: Invalid user es from 182.122.65.197
Sep 15 06:03:17 xxxxxxx9247313 sshd[1445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.65.197 
Sep 15 06:03:18 xxxxxxx9247313 sshd[1445]: Failed password for invalid user es from 182.122.65.197 port 25514 ssh2
Sep 15 06:07:18 xxxxxxx9247313 sshd[1579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.65.197  user=r.r
Sep 15 06:07:20 xxxxxxx9247313 sshd[1579]: Failed password for r.r from 182.122.65.197 port 17858 ssh2
Sep 15 06:11:12 xxxxxxx9247313 sshd[........
------------------------------
2020-09-16 20:45:30
35.236.125.184 attackspambots
35.236.125.184 - - [16/Sep/2020:12:06:38 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.236.125.184 - - [16/Sep/2020:12:06:40 +0200] "POST /wp-login.php HTTP/1.1" 200 8942 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.236.125.184 - - [16/Sep/2020:12:06:42 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-16 20:16:22
213.135.67.42 attack
firewall-block, port(s): 18418/tcp
2020-09-16 20:47:54
129.226.160.128 attackspam
129.226.160.128 (SG/Singapore/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 06:06:05 server4 sshd[19197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.156  user=root
Sep 16 06:06:07 server4 sshd[19197]: Failed password for root from 185.74.5.156 port 32946 ssh2
Sep 16 06:08:10 server4 sshd[20329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.160.128  user=root
Sep 16 06:08:03 server4 sshd[20313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.7.200.120  user=root
Sep 16 06:08:05 server4 sshd[20313]: Failed password for root from 193.7.200.120 port 41750 ssh2
Sep 16 06:05:47 server4 sshd[19073]: Failed password for root from 51.77.212.179 port 46010 ssh2

IP Addresses Blocked:

185.74.5.156 (UZ/Uzbekistan/-)
2020-09-16 20:33:55
138.68.82.194 attack
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2020-09-16T12:20:50Z and 2020-09-16T12:20:50Z
2020-09-16 20:33:42
58.153.245.6 attack
Sep 14 23:06:05 sip sshd[7309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.153.245.6
Sep 14 23:06:08 sip sshd[7309]: Failed password for invalid user cablecom from 58.153.245.6 port 60524 ssh2
Sep 15 19:01:05 sip sshd[2164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.153.245.6
2020-09-16 20:32:14
106.54.242.239 attack
Sep 16 13:21:41 server sshd[27306]: Failed password for invalid user user02 from 106.54.242.239 port 48676 ssh2
Sep 16 13:26:57 server sshd[29326]: Failed password for invalid user med from 106.54.242.239 port 60556 ssh2
Sep 16 13:32:22 server sshd[31336]: Failed password for root from 106.54.242.239 port 44206 ssh2
2020-09-16 20:24:49
210.245.54.103 attack
Icarus honeypot on github
2020-09-16 20:21:12
14.189.179.201 attackspambots
Unauthorized connection attempt from IP address 14.189.179.201 on Port 445(SMB)
2020-09-16 20:28:57
58.250.44.53 attack
$f2bV_matches
2020-09-16 20:27:31
114.32.187.27 attack
Automatic report - Port Scan Attack
2020-09-16 20:44:20
51.75.19.175 attack
(sshd) Failed SSH login from 51.75.19.175 (FR/France/175.ip-51-75-19.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 12:34:03 amsweb01 sshd[4883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.19.175  user=root
Sep 16 12:34:05 amsweb01 sshd[4883]: Failed password for root from 51.75.19.175 port 48546 ssh2
Sep 16 12:49:05 amsweb01 sshd[7235]: Invalid user squid from 51.75.19.175 port 55654
Sep 16 12:49:07 amsweb01 sshd[7235]: Failed password for invalid user squid from 51.75.19.175 port 55654 ssh2
Sep 16 12:52:45 amsweb01 sshd[7751]: Invalid user mariana from 51.75.19.175 port 45924
2020-09-16 20:41:18
122.100.186.68 attack
Sep 16 12:02:43 vps639187 sshd\[21974\]: Invalid user pi from 122.100.186.68 port 46984
Sep 16 12:02:43 vps639187 sshd\[21974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.100.186.68
Sep 16 12:02:45 vps639187 sshd\[21974\]: Failed password for invalid user pi from 122.100.186.68 port 46984 ssh2
...
2020-09-16 20:22:55
90.84.189.254 attack
Sep 16 14:30:34 fhem-rasp sshd[633]: Failed password for root from 90.84.189.254 port 47588 ssh2
Sep 16 14:30:34 fhem-rasp sshd[633]: Disconnected from authenticating user root 90.84.189.254 port 47588 [preauth]
...
2020-09-16 20:43:06

Recently Reported IPs

223.17.122.111 12.245.15.242 213.91.181.117 193.213.144.212
142.44.211.67 212.20.63.54 217.141.24.150 168.0.194.174
185.200.118.51 5.141.71.251 217.21.193.20 188.131.146.22
42.7.26.95 177.206.174.147 134.209.33.27 88.213.3.230
201.206.194.71 123.162.182.243 92.63.196.10 91.121.2.48