Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Istanbul

Region: Istanbul

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: Turk Telekom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.97.47.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16527
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.97.47.252.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 15 02:09:51 CST 2019
;; MSG SIZE  rcvd: 116
Host info
252.47.97.85.in-addr.arpa domain name pointer 85.97.47.252.dynamic.ttnet.com.tr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
252.47.97.85.in-addr.arpa	name = 85.97.47.252.dynamic.ttnet.com.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
170.253.59.240 attackspam
20/4/5@23:55:38: FAIL: Alarm-Network address from=170.253.59.240
...
2020-04-06 13:59:52
181.49.254.230 attack
$f2bV_matches
2020-04-06 14:17:22
185.175.93.105 attack
04/06/2020-02:09:59.724555 185.175.93.105 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-06 14:16:40
222.186.173.142 attackbots
Apr  6 13:21:54 webhost01 sshd[19856]: Failed password for root from 222.186.173.142 port 39692 ssh2
Apr  6 13:22:08 webhost01 sshd[19856]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 39692 ssh2 [preauth]
...
2020-04-06 14:23:10
92.242.126.154 attackspambots
spam
2020-04-06 13:50:02
183.89.211.94 attackbots
(imapd) Failed IMAP login from 183.89.211.94 (TH/Thailand/mx-ll-183.89.211-94.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  6 08:25:22 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 8 secs): user=, method=PLAIN, rip=183.89.211.94, lip=5.63.12.44, session=
2020-04-06 14:07:50
81.22.59.82 attackspam
spam
2020-04-06 13:53:03
62.122.201.170 attackspam
Apr  6 05:07:24 tux postfix/smtpd[21296]: connect from unknown[62.122.201.170]
Apr x@x
Apr  6 05:07:24 tux postfix/smtpd[21296]: lost connection after RCPT from unknown[62.122.201.170]
Apr  6 05:07:24 tux postfix/smtpd[21296]: disconnect from unknown[62.122.201.170]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=62.122.201.170
2020-04-06 13:54:32
31.44.247.180 attackspambots
2020-04-06T05:40:26.878622homeassistant sshd[12921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.44.247.180  user=root
2020-04-06T05:40:28.983080homeassistant sshd[12921]: Failed password for root from 31.44.247.180 port 42805 ssh2
...
2020-04-06 14:07:12
103.129.223.126 attackbotsspam
Attempted WordPress login: "GET /wp-login.php"
2020-04-06 14:11:00
191.232.174.253 attackbotsspam
Brute-force attempt banned
2020-04-06 14:03:20
222.186.31.166 attackspambots
06.04.2020 06:03:37 SSH access blocked by firewall
2020-04-06 14:04:03
218.92.0.201 attackspam
Automatic report BANNED IP
2020-04-06 14:32:50
80.237.79.29 attack
spam
2020-04-06 13:53:23
103.87.236.46 attackbots
spam
2020-04-06 13:46:40

Recently Reported IPs

82.102.18.140 2a02:560:4298:b600:a42a:9646:89be:a7ce 103.208.137.238 61.8.109.64
93.184.86.91 196.121.239.158 151.83.149.10 2003:d2:1f1c:df00:7072:4570:2c06:ea4b
113.8.70.198 195.247.240.12 130.211.245.233 208.218.61.253
2804:14d:8481:8eba:858a:3092:30fc:8f1b 115.227.98.107 148.121.223.14 194.169.93.79
49.71.127.14 149.90.196.218 200.38.229.217 17.235.73.10