City: Kemer
Region: Antalya
Country: Turkey
Internet Service Provider: Türk Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.175.41.0 - 212.175.41.255'
% Abuse contact for '212.175.41.0 - 212.175.41.255' is 'abuse@turktelekom.com.tr'
inetnum: 212.175.41.0 - 212.175.41.255
netname: AnadoluUniversity
descr: Anadolu Universitesi Yunusemre Kampusu ESKISEHIR
country: TR
admin-c: AUIA3-RIPE
tech-c: AUIA3-RIPE
status: ASSIGNED PA
mnt-by: AS9121-MNT
created: 2009-09-01T07:35:30Z
last-modified: 2016-03-04T14:13:25Z
source: RIPE
person: Anadolu Universitesi IP Admin
address: Anadolu Universitesi
address: Bilgisayar Arastirma ve Uygulama Merkezi
phone: +90 222 3351804
nic-hdl: AUIA3-RIPE
mnt-by: ULAKNET-MNT
created: 2012-03-08T08:06:00Z
last-modified: 2017-10-30T22:18:27Z
source: RIPE
% Information related to '212.175.0.0/17AS9121'
route: 212.175.0.0/17
descr: TurkTelecom
origin: AS9121
mnt-by: AS9121-MNT
created: 2004-12-14T13:04:13Z
last-modified: 2004-12-14T13:04:13Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.175.41.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.175.41.126. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032301 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 02:28:40 CST 2026
;; MSG SIZE rcvd: 107
b'Host 126.41.175.212.in-addr.arpa not found: 2(SERVFAIL)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
126.41.175.212.in-addr.arpa name = mssql2012a.porsuk.anadolu.edu.tr.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.208.208.198 | attack | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-07-20 03:46:00 |
| 45.230.81.211 | attack | Jul 19 18:37:47 tamoto postfix/smtpd[6835]: connect from unknown[45.230.81.211] Jul 19 18:37:53 tamoto postfix/smtpd[6835]: warning: unknown[45.230.81.211]: SASL CRAM-MD5 authentication failed: authentication failure Jul 19 18:37:54 tamoto postfix/smtpd[6835]: warning: unknown[45.230.81.211]: SASL PLAIN authentication failed: authentication failure Jul 19 18:37:55 tamoto postfix/smtpd[6835]: warning: unknown[45.230.81.211]: SASL LOGIN authentication failed: authentication failure ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.230.81.211 |
2019-07-20 03:54:12 |
| 168.167.220.64 | attack | Jul 19 16:43:07 *** sshd[25217]: Did not receive identification string from 168.167.220.64 |
2019-07-20 03:59:28 |
| 112.119.173.25 | attackbotsspam | 60001/tcp [2019-07-19]1pkt |
2019-07-20 04:04:10 |
| 98.2.231.48 | attackbotsspam | Jul 19 20:36:46 mail sshd\[17527\]: Failed password for invalid user tomcat from 98.2.231.48 port 59545 ssh2 Jul 19 20:56:31 mail sshd\[17718\]: Invalid user docker from 98.2.231.48 port 55934 Jul 19 20:56:31 mail sshd\[17718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.2.231.48 ... |
2019-07-20 04:14:42 |
| 58.175.144.110 | attack | Jul 19 19:13:35 MK-Soft-VM7 sshd\[1406\]: Invalid user postgres from 58.175.144.110 port 46106 Jul 19 19:13:35 MK-Soft-VM7 sshd\[1406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.175.144.110 Jul 19 19:13:37 MK-Soft-VM7 sshd\[1406\]: Failed password for invalid user postgres from 58.175.144.110 port 46106 ssh2 ... |
2019-07-20 03:38:37 |
| 175.201.62.242 | attack | 2323/tcp 37215/tcp 23/tcp... [2019-05-23/07-19]17pkt,3pt.(tcp) |
2019-07-20 03:38:18 |
| 41.72.240.4 | attackspam | Jul 19 21:31:41 v22018053744266470 sshd[13173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.240.4 Jul 19 21:31:43 v22018053744266470 sshd[13173]: Failed password for invalid user dsj from 41.72.240.4 port 46161 ssh2 Jul 19 21:38:59 v22018053744266470 sshd[13671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.240.4 ... |
2019-07-20 03:45:12 |
| 178.255.112.71 | attack | DATE:2019-07-19 21:15:26, IP:178.255.112.71, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis) |
2019-07-20 03:36:12 |
| 193.77.124.237 | attack | Automatic report - Banned IP Access |
2019-07-20 03:32:01 |
| 171.61.75.233 | attackbots | 60001/tcp [2019-07-19]1pkt |
2019-07-20 04:04:55 |
| 103.23.100.87 | attackbotsspam | Jul 19 21:53:58 vps691689 sshd[5523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87 Jul 19 21:54:00 vps691689 sshd[5523]: Failed password for invalid user zhao from 103.23.100.87 port 41162 ssh2 ... |
2019-07-20 04:05:29 |
| 119.123.224.248 | attackspambots | 445/tcp [2019-07-19]1pkt |
2019-07-20 04:06:45 |
| 49.48.250.248 | attackspambots | 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x 2019-07-19 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=49.48.250.248 |
2019-07-20 03:47:33 |
| 104.140.188.30 | attack | scan z |
2019-07-20 04:15:38 |