城市(city): unknown
省份(region): unknown
国家(country): Turkey
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '185.241.137.0 - 185.241.137.255'
% Abuse contact for '185.241.137.0 - 185.241.137.255' is 'bilgi@uzak.net.tr'
inetnum: 185.241.137.0 - 185.241.137.255
netname: uzakyazilim137-UZAKNET
descr: uzaknet137.0
remarks: --------------------------------------------------------------------------------------
remarks: T.C. Telekomunikasyon kurumu (YS-9) Faaliyet belgeli yer saglayici kurulus.
remarks: 5651 sayili kanunun 5. maddesi geregince firmamiz yer sagladigi sitelere ait
remarks: icerikleri denetlemekle yukumlu degildir.
remarks: lutfen ilgili ip kullanim bilgisini tarafimizdan talep ediniz.
remarks: bilgi icin bilgi@uzak.net.tr
remarks: --------------------------------------------------------------------------------------
country: TR
descr: Altay Mh. Sogut Cd. Vizyon Plaza No:24 / B Blok Kat:12 D: 83 Eryaman Etimesgut ANKARA
descr: +90 850 420 0 724
admin-c: SA36009-RIPE
tech-c: SA36009-RIPE
status: ASSIGNED PA
mnt-by: tr-uzakyazilim-1-mnt
mnt-by: tr-uzaknet-1-mnt
created: 2018-03-07T12:22:44Z
last-modified: 2018-03-07T12:22:44Z
source: RIPE
person: Semih AVCI
remarks: Uzak Yazilim Ve Bilisim Sistemleri Tic. Ltd. Sti.
remarks: --------------------------------------------------------------------------------------
remarks: T.C. Telekomunikasyon kurumu (YS-9) Faaliyet belgeli yer saglayici kurulus.
remarks: 5651 sayili kanunun 5. maddesi geregince firmamiz yer sagladigi sitelere ait
remarks: icerikleri denetlemekle yukumlu degildir.
remarks: lutfen ilgili ip kullanim bilgisini tarafimizdan talep ediniz.
remarks: bilgi icin bilgi@uzak.net.tr
remarks: --------------------------------------------------------------------------------------
address: Altay Mh. Sogut Cd. Vizyon Plaza No:24 / B Blok Kat:12 D:83 Eryaman Etimesgut
address: +906793
address: ankara
address: TURKEY
phone: +903122601654
nic-hdl: SA36009-RIPE
mnt-by: tr-uzaknet-1-mnt
created: 2015-12-11T16:42:01Z
last-modified: 2018-03-03T15:41:19Z
source: RIPE # Filtered
% Information related to '185.241.137.0/24AS56643'
route: 185.241.137.0/24
descr: 185.241.137.0 Route
origin: AS56643
mnt-by: tr-uzaknet-1-mnt
mnt-by: tr-uzakyazilim-1-mnt
created: 2018-03-07T12:35:23Z
last-modified: 2018-03-07T12:35:23Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.241.137.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.241.137.230. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032600 1800 900 604800 86400
;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 22:58:54 CST 2026
;; MSG SIZE rcvd: 108
b'Host 230.137.241.185.in-addr.arpa. not found: 3(NXDOMAIN)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 230.137.241.185.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.55.51.146 | attack | Honeypot attack, port: 445, PTR: 122.55.51.146.pldt.net. |
2020-01-20 03:52:22 |
| 23.129.64.233 | attackspam | Failed password for root from 23.129.64.233 port 54456 ssh2 Failed password for root from 23.129.64.233 port 54456 ssh2 Failed password for root from 23.129.64.233 port 54456 ssh2 Failed password for root from 23.129.64.233 port 54456 ssh2 |
2020-01-20 03:44:57 |
| 112.187.40.236 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-01-20 03:29:33 |
| 222.252.31.172 | attackspambots | Honeypot attack, port: 445, PTR: static.vnpt-hanoi.com.vn. |
2020-01-20 03:38:53 |
| 49.88.112.61 | attackspam | Unauthorized connection attempt detected from IP address 49.88.112.61 to port 22 [J] |
2020-01-20 03:40:20 |
| 27.75.123.80 | attackbots | Automatic report - Port Scan Attack |
2020-01-20 03:48:46 |
| 89.232.76.238 | attackbotsspam | Unauthorized connection attempt detected from IP address 89.232.76.238 to port 8080 [J] |
2020-01-20 03:56:58 |
| 125.164.85.47 | attackspam | 20/1/19@08:40:55: FAIL: Alarm-Network address from=125.164.85.47 20/1/19@08:40:55: FAIL: Alarm-Network address from=125.164.85.47 ... |
2020-01-20 03:47:35 |
| 167.71.242.140 | attack | Jan 19 20:28:52 ncomp sshd[16575]: Invalid user testing from 167.71.242.140 Jan 19 20:28:52 ncomp sshd[16575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.242.140 Jan 19 20:28:52 ncomp sshd[16575]: Invalid user testing from 167.71.242.140 Jan 19 20:28:54 ncomp sshd[16575]: Failed password for invalid user testing from 167.71.242.140 port 34888 ssh2 |
2020-01-20 03:45:56 |
| 185.195.237.117 | attackbots | Failed password for root from 185.195.237.117 port 38611 ssh2 Failed password for root from 185.195.237.117 port 38611 ssh2 Failed password for root from 185.195.237.117 port 38611 ssh2 Failed password for root from 185.195.237.117 port 38611 ssh2 |
2020-01-20 03:29:10 |
| 201.239.183.212 | attack | Honeypot attack, port: 81, PTR: pc-212-183-239-201.cm.vtr.net. |
2020-01-20 04:01:21 |
| 174.127.166.197 | attackbotsspam | Unauthorized connection attempt detected from IP address 174.127.166.197 to port 5555 [J] |
2020-01-20 03:41:19 |
| 14.161.236.82 | attackspambots | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-01-20 04:05:10 |
| 92.19.175.114 | attack | Honeypot attack, port: 81, PTR: host-92-19-175-114.as13285.net. |
2020-01-20 03:53:41 |
| 211.159.241.77 | attackbotsspam | Unauthorized connection attempt detected from IP address 211.159.241.77 to port 2220 [J] |
2020-01-20 03:43:20 |