City: Kayseri
Region: Kayseri
Country: Turkey
Internet Service Provider: Türk Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2a00:1d30::/29'
% Abuse contact for '2a00:1d30::/29' is 'abuse@turktelekom.com.tr'
inet6num: 2a00:1d30::/29
netname: TR-TTNET-20100312
country: TR
org: ORG-TA300-RIPE
admin-c: MI20-RIPE
tech-c: MI20-RIPE
status: ALLOCATED-BY-RIR
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-TTNET-AS
mnt-routes: MNT-TTNET-AS
created: 2015-11-18T13:25:05Z
last-modified: 2017-02-16T10:42:20Z
source: RIPE # Filtered
organisation: ORG-TA300-RIPE
org-name: TTNet A.S.
country: TR
org-type: LIR
address: TTNET Plaza, Esentepe Mh.Salih Tozan Sk. No 16 Karamanc?lar ?? Mrk. D Blok 34394 ?i?li/?STANBUL
address: 34394
address: Istanbul
address: TURKEY
phone: +903125556280
fax-no: +90 312 313 1959
abuse-c: AR17399-RIPE
admin-c: NK1283-RIPE
admin-c: NO638-RIPE
admin-c: GA11360-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: MNT-TTNET-AS
mnt-ref: AS9121-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-TTNET-AS
created: 2007-10-16T10:11:29Z
last-modified: 2020-12-16T12:30:58Z
source: RIPE # Filtered
person: Mehmet ILGAZ
address: Bykdere Cad. No:71 Nurol Plaza A. Blok Kat: 3
address: 34398 Maslak
address: Istanbul - Turkey
phone: +90 212 366 8859
fax-no: +90 212 366 8801
nic-hdl: MI20-RIPE
mnt-by: MNT-TTNET-AS
created: 2003-06-09T13:18:11Z
last-modified: 2014-07-07T08:20:03Z
source: RIPE # Filtered
% Information related to '2a00:1d30::/29AS47331'
route6: 2a00:1d30::/29
origin: AS47331
mnt-by: MNT-TTNET-AS
created: 2021-03-29T22:00:40Z
last-modified: 2021-03-29T22:00:40Z
source: RIPE
% Information related to '2a00:1d30::/29AS9121'
route6: 2a00:1d30::/29
origin: AS9121
mnt-by: MNT-TTNET-AS
mnt-by: AS9121-MNT
created: 2021-03-29T22:02:18Z
last-modified: 2021-03-29T22:02:18Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a00:1d36:c015:8801:ef5f:404c:4ed2:ce45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 9760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a00:1d36:c015:8801:ef5f:404c:4ed2:ce45. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sun Mar 08 20:21:02 CST 2026
;; MSG SIZE rcvd: 68
'
Host 5.4.e.c.2.d.e.4.c.4.0.4.f.5.f.e.1.0.8.8.5.1.0.c.6.3.d.1.0.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 5.4.e.c.2.d.e.4.c.4.0.4.f.5.f.e.1.0.8.8.5.1.0.c.6.3.d.1.0.0.a.2.ip6.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 194.243.6.150 | attackspam | " " |
2019-11-11 06:52:09 |
| 45.32.78.21 | attack | Unauthorized connection attempt from IP address 45.32.78.21 on Port 445(SMB) |
2019-11-11 06:47:38 |
| 51.38.37.128 | attackspambots | Invalid user my from 51.38.37.128 port 56214 |
2019-11-11 06:43:05 |
| 45.55.86.19 | attackbotsspam | Nov 10 16:32:52 game-panel sshd[10700]: Failed password for root from 45.55.86.19 port 35623 ssh2 Nov 10 16:36:47 game-panel sshd[10839]: Failed password for root from 45.55.86.19 port 54197 ssh2 |
2019-11-11 06:53:33 |
| 113.160.225.237 | attack | Unauthorized connection attempt from IP address 113.160.225.237 on Port 445(SMB) |
2019-11-11 06:49:22 |
| 115.52.203.185 | attack | Port 1433 Scan |
2019-11-11 07:06:15 |
| 193.29.13.34 | attackbotsspam | 193.29.13.34 - - \[10/Nov/2019:08:01:53 -0800\] "GET /regionaladmin HTTP/1.1" 404 18074193.29.13.34 - - \[10/Nov/2019:08:01:54 -0800\] "GET /registeradmin HTTP/1.1" 404 18074193.29.13.34 - - \[10/Nov/2019:08:01:56 -0800\] "GET /regularadmin HTTP/1.1" 404 18070 ... |
2019-11-11 07:05:00 |
| 58.64.209.254 | attack | Port Scan 1433 |
2019-11-11 06:57:58 |
| 129.226.76.114 | attackbotsspam | Nov 11 00:09:43 MK-Soft-Root1 sshd[30979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.76.114 Nov 11 00:09:45 MK-Soft-Root1 sshd[30979]: Failed password for invalid user Cleaner123 from 129.226.76.114 port 33374 ssh2 ... |
2019-11-11 07:11:13 |
| 77.222.108.5 | attack | Unauthorized connection attempt from IP address 77.222.108.5 on Port 445(SMB) |
2019-11-11 06:44:43 |
| 121.9.212.36 | attackspam | 121.9.212.36 was recorded 8 times by 8 hosts attempting to connect to the following ports: 4899. Incident counter (4h, 24h, all-time): 8, 15, 84 |
2019-11-11 06:49:38 |
| 176.31.170.245 | attackbotsspam | Nov 10 12:33:36 plusreed sshd[32621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.170.245 user=root Nov 10 12:33:38 plusreed sshd[32621]: Failed password for root from 176.31.170.245 port 40932 ssh2 ... |
2019-11-11 06:46:33 |
| 131.1.242.139 | attackbotsspam | Nov 10 13:20:42 TORMINT sshd\[16252\]: Invalid user password from 131.1.242.139 Nov 10 13:20:42 TORMINT sshd\[16252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.1.242.139 Nov 10 13:20:44 TORMINT sshd\[16252\]: Failed password for invalid user password from 131.1.242.139 port 56334 ssh2 ... |
2019-11-11 06:48:21 |
| 157.55.39.241 | attack | Automatic report - Banned IP Access |
2019-11-11 06:42:17 |
| 198.108.67.109 | attack | 8001/tcp 20/tcp 1366/tcp... [2019-09-10/11-10]114pkt,104pt.(tcp) |
2019-11-11 07:06:35 |