Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kayseri

Region: Kayseri

Country: Turkey

Internet Service Provider: Türk Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '2a00:1d30::/29'

% Abuse contact for '2a00:1d30::/29' is 'abuse@turktelekom.com.tr'

inet6num:       2a00:1d30::/29
netname:        TR-TTNET-20100312
country:        TR
org:            ORG-TA300-RIPE
admin-c:        MI20-RIPE
tech-c:         MI20-RIPE
status:         ALLOCATED-BY-RIR
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-TTNET-AS
mnt-routes:     MNT-TTNET-AS
created:        2015-11-18T13:25:05Z
last-modified:  2017-02-16T10:42:20Z
source:         RIPE # Filtered

organisation:   ORG-TA300-RIPE
org-name:       TTNet A.S.
country:        TR
org-type:       LIR
address:        TTNET Plaza, Esentepe Mh.Salih Tozan Sk. No 16 Karamanc?lar ?? Mrk. D Blok 34394 ?i?li/?STANBUL
address:        34394
address:        Istanbul
address:        TURKEY
phone:          +903125556280
fax-no:         +90 312 313 1959
abuse-c:        AR17399-RIPE
admin-c:        NK1283-RIPE
admin-c:        NO638-RIPE
admin-c:        GA11360-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MNT-TTNET-AS
mnt-ref:        AS9121-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-TTNET-AS
created:        2007-10-16T10:11:29Z
last-modified:  2020-12-16T12:30:58Z
source:         RIPE # Filtered

person:         Mehmet ILGAZ
address:        Bykdere Cad. No:71 Nurol Plaza A. Blok Kat: 3
address:        34398 Maslak
address:        Istanbul - Turkey
phone:          +90 212 366 8859
fax-no:         +90 212 366 8801
nic-hdl:        MI20-RIPE
mnt-by:         MNT-TTNET-AS
created:        2003-06-09T13:18:11Z
last-modified:  2014-07-07T08:20:03Z
source:         RIPE # Filtered

% Information related to '2a00:1d30::/29AS47331'

route6:         2a00:1d30::/29
origin:         AS47331
mnt-by:         MNT-TTNET-AS
created:        2021-03-29T22:00:40Z
last-modified:  2021-03-29T22:00:40Z
source:         RIPE

% Information related to '2a00:1d30::/29AS9121'

route6:         2a00:1d30::/29
origin:         AS9121
mnt-by:         MNT-TTNET-AS
mnt-by:         AS9121-MNT
created:        2021-03-29T22:02:18Z
last-modified:  2021-03-29T22:02:18Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a00:1d36:c015:8801:ef5f:404c:4ed2:ce45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 9760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a00:1d36:c015:8801:ef5f:404c:4ed2:ce45. IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sun Mar 08 20:21:02 CST 2026
;; MSG SIZE  rcvd: 68

'
Host info
Host 5.4.e.c.2.d.e.4.c.4.0.4.f.5.f.e.1.0.8.8.5.1.0.c.6.3.d.1.0.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.4.e.c.2.d.e.4.c.4.0.4.f.5.f.e.1.0.8.8.5.1.0.c.6.3.d.1.0.0.a.2.ip6.arpa: NXDOMAIN
Related comments:
IP Type Details Datetime
194.243.6.150 attackspam
" "
2019-11-11 06:52:09
45.32.78.21 attack
Unauthorized connection attempt from IP address 45.32.78.21 on Port 445(SMB)
2019-11-11 06:47:38
51.38.37.128 attackspambots
Invalid user my from 51.38.37.128 port 56214
2019-11-11 06:43:05
45.55.86.19 attackbotsspam
Nov 10 16:32:52 game-panel sshd[10700]: Failed password for root from 45.55.86.19 port 35623 ssh2
Nov 10 16:36:47 game-panel sshd[10839]: Failed password for root from 45.55.86.19 port 54197 ssh2
2019-11-11 06:53:33
113.160.225.237 attack
Unauthorized connection attempt from IP address 113.160.225.237 on Port 445(SMB)
2019-11-11 06:49:22
115.52.203.185 attack
Port 1433 Scan
2019-11-11 07:06:15
193.29.13.34 attackbotsspam
193.29.13.34 - - \[10/Nov/2019:08:01:53 -0800\] "GET /regionaladmin HTTP/1.1" 404 18074193.29.13.34 - - \[10/Nov/2019:08:01:54 -0800\] "GET /registeradmin HTTP/1.1" 404 18074193.29.13.34 - - \[10/Nov/2019:08:01:56 -0800\] "GET /regularadmin HTTP/1.1" 404 18070
...
2019-11-11 07:05:00
58.64.209.254 attack
Port Scan 1433
2019-11-11 06:57:58
129.226.76.114 attackbotsspam
Nov 11 00:09:43 MK-Soft-Root1 sshd[30979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.76.114 
Nov 11 00:09:45 MK-Soft-Root1 sshd[30979]: Failed password for invalid user Cleaner123 from 129.226.76.114 port 33374 ssh2
...
2019-11-11 07:11:13
77.222.108.5 attack
Unauthorized connection attempt from IP address 77.222.108.5 on Port 445(SMB)
2019-11-11 06:44:43
121.9.212.36 attackspam
121.9.212.36 was recorded 8 times by 8 hosts attempting to connect to the following ports: 4899. Incident counter (4h, 24h, all-time): 8, 15, 84
2019-11-11 06:49:38
176.31.170.245 attackbotsspam
Nov 10 12:33:36 plusreed sshd[32621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.170.245  user=root
Nov 10 12:33:38 plusreed sshd[32621]: Failed password for root from 176.31.170.245 port 40932 ssh2
...
2019-11-11 06:46:33
131.1.242.139 attackbotsspam
Nov 10 13:20:42 TORMINT sshd\[16252\]: Invalid user password from 131.1.242.139
Nov 10 13:20:42 TORMINT sshd\[16252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.1.242.139
Nov 10 13:20:44 TORMINT sshd\[16252\]: Failed password for invalid user password from 131.1.242.139 port 56334 ssh2
...
2019-11-11 06:48:21
157.55.39.241 attack
Automatic report - Banned IP Access
2019-11-11 06:42:17
198.108.67.109 attack
8001/tcp 20/tcp 1366/tcp...
[2019-09-10/11-10]114pkt,104pt.(tcp)
2019-11-11 07:06:35

Recently Reported IPs

172.67.4.142 69.17.3.136 69.17.3.60 223.104.87.50
39.100.83.160 142.202.4.50 112.40.16.1 192.177.148.11
20.215.208.157 87.121.84.76 58.19.79.120 1.24.16.180
122.96.28.240 124.238.165.237 20.169.50.188 38.128.155.49
39.128.155.49 203.131.242.177 142.250.199.68 31.57.10.185