必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Istanbul

省份(region): Istanbul

国家(country): Turkey

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '31.169.82.0 - 31.169.82.255'

% Abuse contact for '31.169.82.0 - 31.169.82.255' is 'abuse@netfactor.net.tr'

inetnum:        31.169.82.0 - 31.169.82.255
org:            ORG-NTVT1-RIPE
netname:        Netfactor-Telekom
descr:          Netfactor-Customer
country:        TR
admin-c:        DE1978-RIPE
tech-c:         DE1978-RIPE
status:         ASSIGNED PA
mnt-by:         NETFACTOR-MNT
created:        2019-07-08T12:43:39Z
last-modified:  2025-06-21T12:49:30Z
source:         RIPE

organisation:   ORG-NTVT1-RIPE
mnt-ref:        ipv4center-mnt
org-name:       Netfactor Telekominikasyon ve Teknoloji Hizmetleri San. ve Tic. A.S.
country:        TR
reg-nr:         647192
org-type:       LIR
address:        Mahir Iz Caddesi No 28 Altunizade Uskudar
address:        34662
address:        Istanbul
address:        TURKEY
phone:          +902164742424
fax-no:         +902164749979
tech-c:         DE1978-RIPE
tech-c:         AD10996-RIPE
abuse-c:        AD10996-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        NETFACTOR-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         NETFACTOR-MNT
created:        2011-03-07T14:31:46Z
last-modified:  2026-05-13T07:33:34Z
source:         RIPE # Filtered

person:         Deniz ENGELOGLU
address:        Mahir Iz Caddesi No:28 B1 Altunizade Uskudar Istanbul
remarks:        NetFactor Telekom ve Tek. Hiz. San. A.S.
remarks:        General Manager
phone:          +90 850 2504040
nic-hdl:        DE1978-RIPE
mnt-by:         NETFACTOR-MNT
created:        2011-04-21T07:43:48Z
last-modified:  2017-10-30T22:13:34Z
source:         RIPE # Filtered

% Information related to '31.169.82.0/24AS56582'

route:          31.169.82.0/24
descr:          NetFactor Telekom
origin:         AS56582
mnt-by:         NETFACTOR-MNT
remarks:        NetFactor Telekom
remarks:        ripe@netfactor.com.tr
created:        2024-03-01T17:57:34Z
last-modified:  2024-03-01T17:57:34Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 31.169.82.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;31.169.82.68.			IN	A

;; Query time: 2 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed May 13 15:55:23 CST 2026
;; MSG SIZE  rcvd: 41

'
HOST信息:
Host 68.82.169.31.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.82.169.31.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.170.65.115 attackspambots
2019-09-11T23:22:27.940307abusebot-7.cloudsearch.cf sshd\[18848\]: Invalid user zabbix from 107.170.65.115 port 58858
2019-09-12 07:31:02
131.221.34.147 attack
Sep 11 19:31:01 vps200512 sshd\[13616\]: Invalid user password from 131.221.34.147
Sep 11 19:31:01 vps200512 sshd\[13616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.34.147
Sep 11 19:31:03 vps200512 sshd\[13616\]: Failed password for invalid user password from 131.221.34.147 port 49658 ssh2
Sep 11 19:38:21 vps200512 sshd\[13727\]: Invalid user user2 from 131.221.34.147
Sep 11 19:38:21 vps200512 sshd\[13727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.34.147
2019-09-12 07:54:59
59.60.180.97 attackbots
$f2bV_matches
2019-09-12 07:37:47
34.73.254.71 attackbotsspam
2019-09-11T23:10:52.671280abusebot-4.cloudsearch.cf sshd\[26348\]: Invalid user admin from 34.73.254.71 port 49190
2019-09-12 07:32:27
49.234.36.126 attackbots
Sep 12 00:18:06 v22019058497090703 sshd[9258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126
Sep 12 00:18:08 v22019058497090703 sshd[9258]: Failed password for invalid user ftpuser from 49.234.36.126 port 19504 ssh2
Sep 12 00:25:08 v22019058497090703 sshd[9819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126
...
2019-09-12 07:24:51
45.172.108.59 attackspambots
Mail sent to address hacked/leaked from atari.st
2019-09-12 07:53:39
5.188.210.28 attackspambots
fell into ViewStateTrap:stockholm
2019-09-12 08:06:13
113.141.66.255 attackbots
2019-09-12T00:28:05.360664lon01.zurich-datacenter.net sshd\[5111\]: Invalid user ftpadmin from 113.141.66.255 port 41463
2019-09-12T00:28:05.367232lon01.zurich-datacenter.net sshd\[5111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.66.255
2019-09-12T00:28:07.340335lon01.zurich-datacenter.net sshd\[5111\]: Failed password for invalid user ftpadmin from 113.141.66.255 port 41463 ssh2
2019-09-12T00:33:19.777225lon01.zurich-datacenter.net sshd\[5227\]: Invalid user user from 113.141.66.255 port 35756
2019-09-12T00:33:19.781586lon01.zurich-datacenter.net sshd\[5227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.66.255
...
2019-09-12 08:01:57
45.82.153.37 attack
Brute force attack stopped by firewall
2019-09-12 07:49:05
49.234.48.86 attack
Sep 11 23:45:54 game-panel sshd[2212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.48.86
Sep 11 23:45:56 game-panel sshd[2212]: Failed password for invalid user ts3bot from 49.234.48.86 port 56344 ssh2
Sep 11 23:52:11 game-panel sshd[2467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.48.86
2019-09-12 08:01:34
218.92.0.184 attack
Sep 12 00:32:47 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2
Sep 12 00:32:49 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2
Sep 12 00:32:52 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2
Sep 12 00:32:55 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2
Sep 12 00:32:59 plex sshd[2915]: Failed password for root from 218.92.0.184 port 2230 ssh2
2019-09-12 07:42:37
116.255.178.190 attackbots
Port scan
2019-09-12 07:43:02
103.36.84.180 attackbots
Sep 12 00:17:19 h2177944 sshd\[29222\]: Invalid user tom from 103.36.84.180 port 33954
Sep 12 00:17:19 h2177944 sshd\[29222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.180
Sep 12 00:17:21 h2177944 sshd\[29222\]: Failed password for invalid user tom from 103.36.84.180 port 33954 ssh2
Sep 12 00:23:50 h2177944 sshd\[29605\]: Invalid user rstudio from 103.36.84.180 port 38810
...
2019-09-12 07:32:58
203.95.212.41 attack
Sep 11 12:22:39 php2 sshd\[10499\]: Invalid user deploy123 from 203.95.212.41
Sep 11 12:22:39 php2 sshd\[10499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41
Sep 11 12:22:41 php2 sshd\[10499\]: Failed password for invalid user deploy123 from 203.95.212.41 port 36223 ssh2
Sep 11 12:29:56 php2 sshd\[11515\]: Invalid user a1b1c3 from 203.95.212.41
Sep 11 12:29:56 php2 sshd\[11515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41
2019-09-12 08:07:51
60.170.183.16 attack
port scan and connect, tcp 23 (telnet)
2019-09-12 07:56:27

最近上报的IP列表

202.144.137.94 110.78.153.121 2606:4700:10::6814:5318 2606:4700:10::6816:4140
20.221.68.74 10.223.24.110 119.28.100.147 134.35.157.43
2606:4700:10::6814:8420 2003:d6:a729:7200:81d8:b8be:f73d:9c8a 99.10.76.25 34.85.82.221
35.187.220.208 43.156.18.240 2606:4700:10::6814:6575 69.189.152.90
204.0.23.7 45.82.13.133 2606:4700:10::6814:5146 2606:4700:10::6814:9411