城市(city): unknown
省份(region): unknown
国家(country): Turkey
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '92.44.0.0 - 92.45.255.255'
% Abuse contact for '92.44.0.0 - 92.45.255.255' is 'abuse@turkcell.com.tr'
inetnum: 92.44.0.0 - 92.45.255.255
netname: TR-BILISIMTELEKOM-20071217
country: TR
org: ORG-BTHA1-RIPE
admin-c: TK2426-RIPE
tech-c: TK2426-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-TELLCOM
mnt-domains: MNT-TELLCOM
mnt-routes: MNT-TELLCOM
created: 2007-12-17T15:32:47Z
last-modified: 2020-09-03T10:34:57Z
source: RIPE # Filtered
organisation: ORG-BTHA1-RIPE
org-name: Superonline Iletisim Hizmetleri A.S.
country: TR
org-type: LIR
address: Yeni Mahalle Pamukkale Sokak No 3 Soganlik - Kartal
address: 34880
address: ISTANBUL
address: TURKEY
phone: +908502224662
fax-no: +90 850 222 1 222
descr: TELLCOM ILETISIM HIZMETLERI A.S.
abuse-c: AR17328-RIPE
admin-c: TK2426-RIPE
mnt-ref: MNT-TELLCOM
mnt-ref: RIPE-NCC-HM-MNT
tech-c: TK2426-RIPE
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-TELLCOM
created: 2005-04-08T13:04:19Z
last-modified: 2022-02-23T14:18:24Z
source: RIPE # Filtered
person: TEKNIK KONTAK
address: Turkcell Maltepe Plaza Yeni Mahalle Pamukkale Sk 34880 Kartal/ISTANBUL TURKEY
phone: +90 850 229 00 00
nic-hdl: TK2426-RIPE
mnt-by: MNT-TELLCOM
created: 2006-02-07T11:52:58Z
last-modified: 2019-02-06T00:09:25Z
source: RIPE
% Information related to '92.44.47.0/24AS34984'
route: 92.44.47.0/24
descr: Tellcom Main Network Statement
origin: AS34984
mnt-by: MNT-TELLCOM
mnt-routes: MNT-TELLCOM
created: 2014-05-07T06:21:35Z
last-modified: 2014-05-07T06:21:35Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.44.47.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;92.44.47.238. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 17:59:48 CST 2026
;; MSG SIZE rcvd: 105
238.47.44.92.in-addr.arpa domain name pointer host-92-44-47-238.reverse.superonline.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
238.47.44.92.in-addr.arpa name = host-92-44-47-238.reverse.superonline.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 66.249.75.128 | attackbots | Automatic report - Banned IP Access |
2020-04-15 20:18:06 |
| 181.171.206.188 | attack | Unauthorized IMAP connection attempt |
2020-04-15 19:49:28 |
| 35.195.238.142 | attack | <6 unauthorized SSH connections |
2020-04-15 19:56:04 |
| 222.186.169.192 | attackbotsspam | Apr 15 13:57:35 meumeu sshd[13806]: Failed password for root from 222.186.169.192 port 64874 ssh2 Apr 15 13:57:53 meumeu sshd[13806]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 64874 ssh2 [preauth] Apr 15 13:57:58 meumeu sshd[13850]: Failed password for root from 222.186.169.192 port 35534 ssh2 ... |
2020-04-15 20:01:02 |
| 171.103.171.242 | attackbotsspam | $f2bV_matches |
2020-04-15 20:07:39 |
| 148.70.223.115 | attackspam | k+ssh-bruteforce |
2020-04-15 20:16:57 |
| 42.236.10.70 | attack | Unauthorized SSH login attempts |
2020-04-15 20:04:54 |
| 128.199.196.186 | attackbots | <6 unauthorized SSH connections |
2020-04-15 19:48:02 |
| 219.147.74.48 | attackspambots | k+ssh-bruteforce |
2020-04-15 20:09:24 |
| 100.20.156.137 | attackbots | 15.04.2020 05:51:18 - Bad Robot Ignore Robots.txt |
2020-04-15 19:54:47 |
| 115.231.221.129 | attackbotsspam | 20 attempts against mh-ssh on cloud |
2020-04-15 19:51:22 |
| 192.169.190.108 | attackspambots | Apr 15 02:14:33 ws22vmsma01 sshd[59389]: Failed password for root from 192.169.190.108 port 34278 ssh2 ... |
2020-04-15 20:05:24 |
| 125.110.47.161 | attackbotsspam | FTP brute-force attack |
2020-04-15 20:06:06 |
| 106.12.151.236 | attack | 2020-04-15T11:46:18.280181shield sshd\[31741\]: Invalid user hostmaster from 106.12.151.236 port 48366 2020-04-15T11:46:18.284023shield sshd\[31741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.236 2020-04-15T11:46:20.619939shield sshd\[31741\]: Failed password for invalid user hostmaster from 106.12.151.236 port 48366 ssh2 2020-04-15T11:49:22.923176shield sshd\[32435\]: Invalid user user2 from 106.12.151.236 port 33964 2020-04-15T11:49:22.927373shield sshd\[32435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.236 |
2020-04-15 20:03:31 |
| 186.206.148.119 | attackspambots | Repeated brute force against a port |
2020-04-15 19:46:29 |