Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Türkiye

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.97.245.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.97.245.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 20:26:05 CST 2025
;; MSG SIZE  rcvd: 104
Host info
7.245.97.85.in-addr.arpa domain name pointer 85.97.245.7.dynamic.ttnet.com.tr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.245.97.85.in-addr.arpa	name = 85.97.245.7.dynamic.ttnet.com.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.70.24.20 attackspambots
Dec 17 22:13:49 OPSO sshd\[1211\]: Invalid user test from 148.70.24.20 port 47386
Dec 17 22:13:50 OPSO sshd\[1211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.24.20
Dec 17 22:13:51 OPSO sshd\[1211\]: Failed password for invalid user test from 148.70.24.20 port 47386 ssh2
Dec 17 22:20:01 OPSO sshd\[2935\]: Invalid user fep from 148.70.24.20 port 55964
Dec 17 22:20:01 OPSO sshd\[2935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.24.20
2019-12-18 05:30:43
40.92.19.22 attackspambots
Dec 17 17:19:47 debian-2gb-vpn-nbg1-1 kernel: [970754.346641] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.19.22 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=15611 DF PROTO=TCP SPT=35584 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-18 05:34:45
31.200.97.93 attackbotsspam
1576592426 - 12/17/2019 15:20:26 Host: 31.200.97.93/31.200.97.93 Port: 445 TCP Blocked
2019-12-18 04:55:34
181.48.144.82 attack
1576592398 - 12/17/2019 15:19:58 Host: 181.48.144.82/181.48.144.82 Port: 445 TCP Blocked
2019-12-18 05:24:19
54.37.230.15 attackspambots
Dec 17 21:39:47 vpn01 sshd[21618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.230.15
Dec 17 21:39:49 vpn01 sshd[21618]: Failed password for invalid user colet from 54.37.230.15 port 46584 ssh2
...
2019-12-18 05:11:43
62.210.129.123 attackbotsspam
fail2ban honeypot
2019-12-18 05:25:31
185.143.223.126 attack
Dec 17 22:04:24 debian-2gb-nbg1-2 kernel: \[269441.371196\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.126 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=26014 PROTO=TCP SPT=59316 DPT=90 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-18 05:07:10
85.172.105.62 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 17-12-2019 14:20:16.
2019-12-18 05:05:35
146.120.222.5 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 17-12-2019 14:20:14.
2019-12-18 05:08:47
185.164.72.76 attack
Unauthorized connection attempt from IP address 185.164.72.76 on Port 3389(RDP)
2019-12-18 05:30:19
176.36.192.193 attackspambots
Dec 17 18:35:59 master sshd[22214]: Failed password for invalid user salar from 176.36.192.193 port 57364 ssh2
Dec 17 18:42:50 master sshd[22232]: Failed password for invalid user test from 176.36.192.193 port 55156 ssh2
Dec 17 18:47:51 master sshd[22253]: Failed password for invalid user apache from 176.36.192.193 port 35306 ssh2
Dec 17 18:52:47 master sshd[22271]: Failed password for invalid user rufe from 176.36.192.193 port 43790 ssh2
Dec 17 18:57:53 master sshd[22283]: Failed password for root from 176.36.192.193 port 52624 ssh2
Dec 17 19:03:02 master sshd[22625]: Failed password for root from 176.36.192.193 port 60944 ssh2
Dec 17 19:08:24 master sshd[22641]: Failed password for invalid user ig from 176.36.192.193 port 41090 ssh2
Dec 17 19:13:38 master sshd[22655]: Failed password for invalid user sachitt from 176.36.192.193 port 49438 ssh2
Dec 17 19:18:52 master sshd[22687]: Failed password for invalid user rostad from 176.36.192.193 port 57816 ssh2
Dec 17 19:24:07 master sshd[22703]: Failed password fo
2019-12-18 05:15:27
167.86.86.24 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-12-18 05:09:16
83.175.213.250 attackspambots
Dec 17 17:29:27 firewall sshd[30596]: Invalid user admin from 83.175.213.250
Dec 17 17:29:29 firewall sshd[30596]: Failed password for invalid user admin from 83.175.213.250 port 51042 ssh2
Dec 17 17:35:39 firewall sshd[30715]: Invalid user dacasin from 83.175.213.250
...
2019-12-18 05:31:06
122.166.223.47 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-12-18 04:53:24
94.231.188.97 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 17-12-2019 14:20:16.
2019-12-18 05:04:56

Recently Reported IPs

130.40.51.252 109.170.40.171 50.115.41.125 240.159.193.163
85.239.248.200 229.164.119.16 121.225.113.11 57.84.197.166
240.180.95.5 24.201.243.220 116.63.246.46 226.248.178.41
248.224.229.102 116.183.248.185 247.91.133.112 38.109.53.17
93.64.162.157 107.175.66.14 245.23.135.166 196.237.24.252