城市(city): Istanbul
省份(region): Istanbul
国家(country): Turkey
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '31.169.82.0 - 31.169.82.255'
% Abuse contact for '31.169.82.0 - 31.169.82.255' is 'abuse@netfactor.net.tr'
inetnum: 31.169.82.0 - 31.169.82.255
org: ORG-NTVT1-RIPE
netname: Netfactor-Telekom
descr: Netfactor-Customer
country: TR
admin-c: DE1978-RIPE
tech-c: DE1978-RIPE
status: ASSIGNED PA
mnt-by: NETFACTOR-MNT
created: 2019-07-08T12:43:39Z
last-modified: 2025-06-21T12:49:30Z
source: RIPE
organisation: ORG-NTVT1-RIPE
mnt-ref: ipv4center-mnt
org-name: Netfactor Telekominikasyon ve Teknoloji Hizmetleri San. ve Tic. A.S.
country: TR
reg-nr: 647192
org-type: LIR
address: Mahir Iz Caddesi No 28 Altunizade Uskudar
address: 34662
address: Istanbul
address: TURKEY
phone: +902164742424
fax-no: +902164749979
tech-c: DE1978-RIPE
tech-c: AD10996-RIPE
abuse-c: AD10996-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: NETFACTOR-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: NETFACTOR-MNT
created: 2011-03-07T14:31:46Z
last-modified: 2026-05-13T07:33:34Z
source: RIPE # Filtered
person: Deniz ENGELOGLU
address: Mahir Iz Caddesi No:28 B1 Altunizade Uskudar Istanbul
remarks: NetFactor Telekom ve Tek. Hiz. San. A.S.
remarks: General Manager
phone: +90 850 2504040
nic-hdl: DE1978-RIPE
mnt-by: NETFACTOR-MNT
created: 2011-04-21T07:43:48Z
last-modified: 2017-10-30T22:13:34Z
source: RIPE # Filtered
% Information related to '31.169.82.0/24AS56582'
route: 31.169.82.0/24
descr: NetFactor Telekom
origin: AS56582
mnt-by: NETFACTOR-MNT
remarks: NetFactor Telekom
remarks: ripe@netfactor.com.tr
created: 2024-03-01T17:57:34Z
last-modified: 2024-03-01T17:57:34Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 31.169.82.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;31.169.82.68. IN A
;; Query time: 2 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed May 13 15:55:23 CST 2026
;; MSG SIZE rcvd: 41
'
Host 68.82.169.31.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 68.82.169.31.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 107.170.65.115 | attackspambots | 2019-09-11T23:22:27.940307abusebot-7.cloudsearch.cf sshd\[18848\]: Invalid user zabbix from 107.170.65.115 port 58858 |
2019-09-12 07:31:02 |
| 131.221.34.147 | attack | Sep 11 19:31:01 vps200512 sshd\[13616\]: Invalid user password from 131.221.34.147 Sep 11 19:31:01 vps200512 sshd\[13616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.34.147 Sep 11 19:31:03 vps200512 sshd\[13616\]: Failed password for invalid user password from 131.221.34.147 port 49658 ssh2 Sep 11 19:38:21 vps200512 sshd\[13727\]: Invalid user user2 from 131.221.34.147 Sep 11 19:38:21 vps200512 sshd\[13727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.34.147 |
2019-09-12 07:54:59 |
| 59.60.180.97 | attackbots | $f2bV_matches |
2019-09-12 07:37:47 |
| 34.73.254.71 | attackbotsspam | 2019-09-11T23:10:52.671280abusebot-4.cloudsearch.cf sshd\[26348\]: Invalid user admin from 34.73.254.71 port 49190 |
2019-09-12 07:32:27 |
| 49.234.36.126 | attackbots | Sep 12 00:18:06 v22019058497090703 sshd[9258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126 Sep 12 00:18:08 v22019058497090703 sshd[9258]: Failed password for invalid user ftpuser from 49.234.36.126 port 19504 ssh2 Sep 12 00:25:08 v22019058497090703 sshd[9819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126 ... |
2019-09-12 07:24:51 |
| 45.172.108.59 | attackspambots | Mail sent to address hacked/leaked from atari.st |
2019-09-12 07:53:39 |
| 5.188.210.28 | attackspambots | fell into ViewStateTrap:stockholm |
2019-09-12 08:06:13 |
| 113.141.66.255 | attackbots | 2019-09-12T00:28:05.360664lon01.zurich-datacenter.net sshd\[5111\]: Invalid user ftpadmin from 113.141.66.255 port 41463 2019-09-12T00:28:05.367232lon01.zurich-datacenter.net sshd\[5111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.66.255 2019-09-12T00:28:07.340335lon01.zurich-datacenter.net sshd\[5111\]: Failed password for invalid user ftpadmin from 113.141.66.255 port 41463 ssh2 2019-09-12T00:33:19.777225lon01.zurich-datacenter.net sshd\[5227\]: Invalid user user from 113.141.66.255 port 35756 2019-09-12T00:33:19.781586lon01.zurich-datacenter.net sshd\[5227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.66.255 ... |
2019-09-12 08:01:57 |
| 45.82.153.37 | attack | Brute force attack stopped by firewall |
2019-09-12 07:49:05 |
| 49.234.48.86 | attack | Sep 11 23:45:54 game-panel sshd[2212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.48.86 Sep 11 23:45:56 game-panel sshd[2212]: Failed password for invalid user ts3bot from 49.234.48.86 port 56344 ssh2 Sep 11 23:52:11 game-panel sshd[2467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.48.86 |
2019-09-12 08:01:34 |
| 218.92.0.184 | attack | Sep 12 00:32:47 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2 Sep 12 00:32:49 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2 Sep 12 00:32:52 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2 Sep 12 00:32:55 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2 Sep 12 00:32:59 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2 |
2019-09-12 07:42:37 |
| 116.255.178.190 | attackbots | Port scan |
2019-09-12 07:43:02 |
| 103.36.84.180 | attackbots | Sep 12 00:17:19 h2177944 sshd\[29222\]: Invalid user tom from 103.36.84.180 port 33954 Sep 12 00:17:19 h2177944 sshd\[29222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.180 Sep 12 00:17:21 h2177944 sshd\[29222\]: Failed password for invalid user tom from 103.36.84.180 port 33954 ssh2 Sep 12 00:23:50 h2177944 sshd\[29605\]: Invalid user rstudio from 103.36.84.180 port 38810 ... |
2019-09-12 07:32:58 |
| 203.95.212.41 | attack | Sep 11 12:22:39 php2 sshd\[10499\]: Invalid user deploy123 from 203.95.212.41 Sep 11 12:22:39 php2 sshd\[10499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41 Sep 11 12:22:41 php2 sshd\[10499\]: Failed password for invalid user deploy123 from 203.95.212.41 port 36223 ssh2 Sep 11 12:29:56 php2 sshd\[11515\]: Invalid user a1b1c3 from 203.95.212.41 Sep 11 12:29:56 php2 sshd\[11515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41 |
2019-09-12 08:07:51 |
| 60.170.183.16 | attack | port scan and connect, tcp 23 (telnet) |
2019-09-12 07:56:27 |