Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '95.85.244.0 - 95.85.244.255'

% Abuse contact for '95.85.244.0 - 95.85.244.255' is 'noyobzoda.far@outlook.com'

inetnum:        95.85.244.0 - 95.85.244.255
org:            ORG-NFS9-RIPE
netname:        ORG-NFS9-RIPE
country:        TJ
admin-c:        NFS33-RIPE
tech-c:         NFS33-RIPE
status:         ASSIGNED PA
mnt-by:         zanemint-mnt
created:        2025-12-04T06:43:13Z
last-modified:  2025-12-04T10:28:35Z
source:         RIPE
abuse-c:        AA45271-RIPE
mnt-domains:    nfstj-mnt
mnt-routes:     nfstj-mnt

organisation:   ORG-NFS9-RIPE
org-name:       Noyobzoda Faridduni Saidilhom
org-type:       OTHER
address:        Rudaki Street 4, A3 03.12, Obburdon Jamoat, Mastchoh District, Sughd Region, Tajikistan
country:        TJ
abuse-c:        AA45271-RIPE
mnt-ref:        nfstj-mnt
mnt-ref:        mnt-bg-eurocrypt-1
mnt-ref:        GOODTEC-MNT
mnt-ref:        zanemint-mnt
mnt-ref:        RIT-ECODE-MNT
mnt-ref:        sc-rapidseedbox-1-mnt
mnt-by:         nfstj-mnt
created:        2025-06-30T15:57:25Z
last-modified:  2026-02-03T18:16:34Z
source:         RIPE # Filtered

person:         Noyobzoda Faridduni Saidilhom
address:        Rudaki Street 4, A3 03.12, Obburdon Jamoat, Mastchoh District, Sughd Region, Tajikistan
phone:          +992109389511
nic-hdl:        NFS33-RIPE
mnt-by:         nfstj-mnt
created:        2025-06-30T15:54:16Z
last-modified:  2025-06-30T15:54:16Z
source:         RIPE

% Information related to '95.85.244.0/24AS208885'

route:          95.85.244.0/24
origin:         AS208885
mnt-by:         nfstj-mnt
created:        2025-12-04T10:03:47Z
last-modified:  2025-12-04T10:03:47Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.85.244.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.85.244.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 11:30:41 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 192.244.85.95.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.244.85.95.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.0.131.58 attackbots
port scan/probe/communication attempt; port 23
2019-12-02 08:17:46
45.165.15.250 attackbots
port scan/probe/communication attempt; port 23
2019-12-02 07:51:08
118.32.194.132 attackspam
Dec  1 23:28:24 pi sshd\[11590\]: Failed password for invalid user trista from 118.32.194.132 port 40832 ssh2
Dec  1 23:35:17 pi sshd\[11897\]: Invalid user michal from 118.32.194.132 port 55238
Dec  1 23:35:17 pi sshd\[11897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.194.132
Dec  1 23:35:19 pi sshd\[11897\]: Failed password for invalid user michal from 118.32.194.132 port 55238 ssh2
Dec  1 23:42:05 pi sshd\[12349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.194.132  user=games
...
2019-12-02 07:43:06
218.92.0.191 attack
Dec  1 16:56:06 home sshd[21320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Dec  1 16:56:08 home sshd[21320]: Failed password for root from 218.92.0.191 port 13971 ssh2
...
2019-12-02 08:04:03
129.211.113.29 attackspam
Dec  2 05:10:15 vibhu-HP-Z238-Microtower-Workstation sshd\[12506\]: Invalid user wwwadmin from 129.211.113.29
Dec  2 05:10:15 vibhu-HP-Z238-Microtower-Workstation sshd\[12506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.113.29
Dec  2 05:10:17 vibhu-HP-Z238-Microtower-Workstation sshd\[12506\]: Failed password for invalid user wwwadmin from 129.211.113.29 port 37162 ssh2
Dec  2 05:16:40 vibhu-HP-Z238-Microtower-Workstation sshd\[13120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.113.29  user=root
Dec  2 05:16:41 vibhu-HP-Z238-Microtower-Workstation sshd\[13120\]: Failed password for root from 129.211.113.29 port 49646 ssh2
...
2019-12-02 08:01:29
118.24.178.224 attackspambots
Dec  2 00:50:47 MK-Soft-VM3 sshd[26908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.178.224 
Dec  2 00:50:50 MK-Soft-VM3 sshd[26908]: Failed password for invalid user trey from 118.24.178.224 port 56780 ssh2
...
2019-12-02 07:54:38
182.254.172.159 attackbotsspam
Dec  2 00:33:05 vps666546 sshd\[14742\]: Invalid user junkie from 182.254.172.159 port 59340
Dec  2 00:33:05 vps666546 sshd\[14742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.159
Dec  2 00:33:07 vps666546 sshd\[14742\]: Failed password for invalid user junkie from 182.254.172.159 port 59340 ssh2
Dec  2 00:39:32 vps666546 sshd\[15069\]: Invalid user xxl from 182.254.172.159 port 40350
Dec  2 00:39:32 vps666546 sshd\[15069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.159
...
2019-12-02 07:52:19
125.64.94.221 attack
firewall-block, port(s): 7/tcp
2019-12-02 07:54:21
196.33.226.72 attackspam
Unauthorised access (Dec  2) SRC=196.33.226.72 LEN=40 TTL=239 ID=56633 TCP DPT=1433 WINDOW=1024 SYN
2019-12-02 07:46:03
165.227.1.117 attackspam
F2B jail: sshd. Time: 2019-12-02 00:57:37, Reported by: VKReport
2019-12-02 08:11:56
128.199.150.228 attackbots
Dec  1 13:41:19 web9 sshd\[8020\]: Invalid user lisa from 128.199.150.228
Dec  1 13:41:19 web9 sshd\[8020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.150.228
Dec  1 13:41:22 web9 sshd\[8020\]: Failed password for invalid user lisa from 128.199.150.228 port 42784 ssh2
Dec  1 13:47:52 web9 sshd\[9024\]: Invalid user training from 128.199.150.228
Dec  1 13:47:52 web9 sshd\[9024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.150.228
2019-12-02 07:49:08
218.92.0.141 attackbotsspam
SSH-BruteForce
2019-12-02 07:39:37
46.38.144.57 attack
Dec 02 00:39:46 auth: Info: passwd-file(image5@djejm.de,46.38.144.57): unknown user
Dec 02 00:40:38 auth: Info: passwd-file(poczta2@djejm.de,46.38.144.57): unknown user
Dec 02 00:41:24 auth: Info: passwd-file(retracker@djejm.de,46.38.144.57): unknown user
Dec 02 00:42:11 auth: Info: passwd-file(memorial@djejm.de,46.38.144.57): unknown user
Dec 02 00:42:58 auth: Info: passwd-file(erato@djejm.de,46.38.144.57): unknown user
2019-12-02 07:45:30
1.52.251.26 attackbotsspam
port scan/probe/communication attempt; port 23
2019-12-02 08:07:42
165.227.26.69 attackspam
2019-12-01T23:51:59.024530abusebot-4.cloudsearch.cf sshd\[9660\]: Invalid user kernoops from 165.227.26.69 port 50938
2019-12-02 08:05:12

Recently Reported IPs

172.71.164.200 148.153.188.246 2606:4700:10::6816:3049 2606:4700:10::ac43:234e
109.167.82.43 2606:4700:10::6814:5871 2606:4700:10::ac43:1932 2606:4700:10::ac43:880
122.192.203.8 162.216.149.88 137.184.104.255 64.62.156.57
58.255.236.64 120.82.84.13 160.119.76.57 2606:4700:10::ac43:1257
2606:4700:10::6814:9118 2606:4700:10::ac43:1295 2606:4700:10::ac43:1365 2606:4700:10::6816:4819