城市(city): Istanbul
省份(region): Istanbul
国家(country): Turkey
运营商(isp): Türk Telekom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '85.100.0.0 - 85.100.255.255'
% Abuse contact for '85.100.0.0 - 85.100.255.255' is 'abuse@turktelekom.com.tr'
inetnum: 85.100.0.0 - 85.100.255.255
netname: TurkTelekom
descr: TT ADSL-dynamic-TTNet
country: TR
admin-c: TTBA1-RIPE
tech-c: TTBA1-RIPE
status: ASSIGNED PA
mnt-by: AS9121-MNT
created: 2010-11-09T15:28:06Z
last-modified: 2010-11-09T15:28:06Z
source: RIPE
role: TT Administrative Contact Role
address: Turk Telekomunikasyon A.S Turgut Ozal Blv. Aydinlikevler
address: 06103 ANKARA TURKEY
phone: +90 312 555 0000
fax-no: +90 312 313 1924
admin-c: BADB3-RIPE
abuse-mailbox: abuse@turktelekom.com.tr
tech-c: BADB3-RIPE
tech-c: BADB3-RIPE
tech-c: BADB3-RIPE
nic-hdl: TTBA1-RIPE
mnt-by: AS9121-MNT
created: 2002-02-28T12:22:28Z
last-modified: 2022-01-28T07:15:56Z
source: RIPE # Filtered
% Information related to '85.100.0.0/17AS9121'
route: 85.100.0.0/17
descr: TurkTelecom
origin: AS9121
mnt-by: AS9121-MNT
created: 2005-02-25T15:10:40Z
last-modified: 2005-02-25T15:10:40Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.100.121.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.100.121.129. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026043000 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 21:12:46 CST 2026
;; MSG SIZE rcvd: 107
129.121.100.85.in-addr.arpa domain name pointer 85.100.121.129.dynamic.ttnet.com.tr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.121.100.85.in-addr.arpa name = 85.100.121.129.dynamic.ttnet.com.tr.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 1.71.129.49 | attackbotsspam | Jun 20 14:01:09 ns392434 sshd[22995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49 user=root Jun 20 14:01:11 ns392434 sshd[22995]: Failed password for root from 1.71.129.49 port 49662 ssh2 Jun 20 14:09:22 ns392434 sshd[23235]: Invalid user suporte from 1.71.129.49 port 33496 Jun 20 14:09:22 ns392434 sshd[23235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49 Jun 20 14:09:22 ns392434 sshd[23235]: Invalid user suporte from 1.71.129.49 port 33496 Jun 20 14:09:25 ns392434 sshd[23235]: Failed password for invalid user suporte from 1.71.129.49 port 33496 ssh2 Jun 20 14:12:44 ns392434 sshd[23295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49 user=root Jun 20 14:12:46 ns392434 sshd[23295]: Failed password for root from 1.71.129.49 port 57468 ssh2 Jun 20 14:16:03 ns392434 sshd[23400]: Invalid user user1 from 1.71.129.49 port 53216 |
2020-06-21 00:34:14 |
| 212.64.4.3 | attack | Jun 20 18:33:07 gw1 sshd[13265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.4.3 Jun 20 18:33:09 gw1 sshd[13265]: Failed password for invalid user mauro from 212.64.4.3 port 45928 ssh2 ... |
2020-06-21 00:12:34 |
| 83.24.11.224 | attackbotsspam | Jun 20 15:16:46 abendstille sshd\[11648\]: Invalid user benjamin from 83.24.11.224 Jun 20 15:16:46 abendstille sshd\[11648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.11.224 Jun 20 15:16:49 abendstille sshd\[11648\]: Failed password for invalid user benjamin from 83.24.11.224 port 42962 ssh2 Jun 20 15:22:49 abendstille sshd\[18284\]: Invalid user ut2k4server from 83.24.11.224 Jun 20 15:22:49 abendstille sshd\[18284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.11.224 ... |
2020-06-21 00:05:11 |
| 84.10.62.6 | attackspambots | Jun 20 12:57:31 roki-contabo sshd\[396\]: Invalid user bbs from 84.10.62.6 Jun 20 12:57:31 roki-contabo sshd\[396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.10.62.6 Jun 20 12:57:34 roki-contabo sshd\[396\]: Failed password for invalid user bbs from 84.10.62.6 port 43321 ssh2 Jun 20 14:16:14 roki-contabo sshd\[1330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.10.62.6 user=root Jun 20 14:16:16 roki-contabo sshd\[1330\]: Failed password for root from 84.10.62.6 port 46863 ssh2 ... |
2020-06-21 00:26:19 |
| 52.152.165.149 | attackspambots | Time: Sat Jun 20 09:08:39 2020 -0300 IP: 52.152.165.149 (US/United States/-) Failures: 5 (mod_security) Interval: 3600 seconds Blocked: Permanent Block |
2020-06-21 00:20:16 |
| 61.177.172.102 | attack | Jun 20 13:32:54 firewall sshd[24748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102 user=root Jun 20 13:32:56 firewall sshd[24748]: Failed password for root from 61.177.172.102 port 47993 ssh2 Jun 20 13:32:59 firewall sshd[24748]: Failed password for root from 61.177.172.102 port 47993 ssh2 ... |
2020-06-21 00:34:49 |
| 112.85.42.104 | attack | Jun 20 17:51:17 vps sshd[462828]: Failed password for root from 112.85.42.104 port 26667 ssh2 Jun 20 17:51:20 vps sshd[462828]: Failed password for root from 112.85.42.104 port 26667 ssh2 Jun 20 17:51:23 vps sshd[463516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104 user=root Jun 20 17:51:25 vps sshd[463516]: Failed password for root from 112.85.42.104 port 61202 ssh2 Jun 20 17:51:27 vps sshd[463516]: Failed password for root from 112.85.42.104 port 61202 ssh2 ... |
2020-06-20 23:55:05 |
| 207.46.13.11 | attackbots | Automatic report - Banned IP Access |
2020-06-20 23:53:43 |
| 52.143.166.82 | attackspam | 06/20/2020-08:16:43.668395 52.143.166.82 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-21 00:01:24 |
| 106.52.248.175 | attackbotsspam | Jun 18 21:15:13 mail sshd[2101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.248.175 Jun 18 21:15:15 mail sshd[2101]: Failed password for invalid user factorio from 106.52.248.175 port 51984 ssh2 ... |
2020-06-20 23:58:51 |
| 122.152.196.222 | attack | Jun 18 18:28:50 mail sshd[3671]: Failed password for root from 122.152.196.222 port 52812 ssh2 Jun 18 18:39:10 mail sshd[11636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.196.222 ... |
2020-06-21 00:21:56 |
| 200.219.207.42 | attackbots | Jun 20 15:20:36 ift sshd\[46548\]: Invalid user md from 200.219.207.42Jun 20 15:20:38 ift sshd\[46548\]: Failed password for invalid user md from 200.219.207.42 port 56672 ssh2Jun 20 15:24:30 ift sshd\[46726\]: Failed password for root from 200.219.207.42 port 56166 ssh2Jun 20 15:28:20 ift sshd\[47451\]: Invalid user irina from 200.219.207.42Jun 20 15:28:23 ift sshd\[47451\]: Failed password for invalid user irina from 200.219.207.42 port 55670 ssh2 ... |
2020-06-21 00:33:02 |
| 212.70.149.82 | attackbots | Jun 20 18:21:30 relay postfix/smtpd\[16861\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 18:21:47 relay postfix/smtpd\[1230\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 18:22:01 relay postfix/smtpd\[22024\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 18:22:18 relay postfix/smtpd\[1215\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 18:22:31 relay postfix/smtpd\[16861\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-06-21 00:25:11 |
| 179.228.32.1 | attackspambots | SSH Honeypot -> SSH Bruteforce / Login |
2020-06-20 23:59:29 |
| 37.49.224.87 | attackspam | 2020-06-20T14:16:13.279362 X postfix/smtpd[462661]: NOQUEUE: reject: RCPT from unknown[37.49.224.87]: 554 5.7.1 Service unavailable; Client host [37.49.224.87] blocked using zen.spamhaus.org; from= |
2020-06-21 00:28:52 |