City: Istanbul
Region: Istanbul
Country: Turkey
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '31.169.82.0 - 31.169.82.255'
% Abuse contact for '31.169.82.0 - 31.169.82.255' is 'abuse@netfactor.net.tr'
inetnum: 31.169.82.0 - 31.169.82.255
org: ORG-NTVT1-RIPE
netname: Netfactor-Telekom
descr: Netfactor-Customer
country: TR
admin-c: DE1978-RIPE
tech-c: DE1978-RIPE
status: ASSIGNED PA
mnt-by: NETFACTOR-MNT
created: 2019-07-08T12:43:39Z
last-modified: 2025-06-21T12:49:30Z
source: RIPE
organisation: ORG-NTVT1-RIPE
mnt-ref: ipv4center-mnt
org-name: Netfactor Telekominikasyon ve Teknoloji Hizmetleri San. ve Tic. A.S.
country: TR
reg-nr: 647192
org-type: LIR
address: Mahir Iz Caddesi No 28 Altunizade Uskudar
address: 34662
address: Istanbul
address: TURKEY
phone: +902164742424
fax-no: +902164749979
tech-c: DE1978-RIPE
tech-c: AD10996-RIPE
abuse-c: AD10996-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: NETFACTOR-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: NETFACTOR-MNT
created: 2011-03-07T14:31:46Z
last-modified: 2026-05-13T07:33:34Z
source: RIPE # Filtered
person: Deniz ENGELOGLU
address: Mahir Iz Caddesi No:28 B1 Altunizade Uskudar Istanbul
remarks: NetFactor Telekom ve Tek. Hiz. San. A.S.
remarks: General Manager
phone: +90 850 2504040
nic-hdl: DE1978-RIPE
mnt-by: NETFACTOR-MNT
created: 2011-04-21T07:43:48Z
last-modified: 2017-10-30T22:13:34Z
source: RIPE # Filtered
% Information related to '31.169.82.0/24AS56582'
route: 31.169.82.0/24
descr: NetFactor Telekom
origin: AS56582
mnt-by: NETFACTOR-MNT
remarks: NetFactor Telekom
remarks: ripe@netfactor.com.tr
created: 2024-03-01T17:57:34Z
last-modified: 2024-03-01T17:57:34Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 31.169.82.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;31.169.82.68. IN A
;; Query time: 2 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed May 13 15:55:23 CST 2026
;; MSG SIZE rcvd: 41
'
Host 68.82.169.31.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 68.82.169.31.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.156.209.222 | attack | Nov 25 19:40:32 MK-Soft-VM5 sshd[24002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.156.209.222 Nov 25 19:40:34 MK-Soft-VM5 sshd[24002]: Failed password for invalid user alcott from 182.156.209.222 port 31931 ssh2 ... |
2019-11-26 04:19:14 |
| 178.128.236.202 | attackspambots | 178.128.236.202 - - \[25/Nov/2019:18:01:15 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 178.128.236.202 - - \[25/Nov/2019:18:01:15 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-11-26 04:30:56 |
| 176.31.182.125 | attackspam | (sshd) Failed SSH login from 176.31.182.125 (FR/France/solofarmaciveterinari.it): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 25 16:11:20 s1 sshd[29884]: Invalid user host from 176.31.182.125 port 57602 Nov 25 16:11:22 s1 sshd[29884]: Failed password for invalid user host from 176.31.182.125 port 57602 ssh2 Nov 25 16:28:59 s1 sshd[30216]: Invalid user 44444 from 176.31.182.125 port 44178 Nov 25 16:29:01 s1 sshd[30216]: Failed password for invalid user 44444 from 176.31.182.125 port 44178 ssh2 Nov 25 16:32:05 s1 sshd[30280]: Invalid user nfs from 176.31.182.125 port 33223 |
2019-11-26 04:36:14 |
| 114.84.246.176 | attack | Unauthorized connection attempt from IP address 114.84.246.176 on Port 445(SMB) |
2019-11-26 04:51:49 |
| 103.66.16.18 | attackspam | Nov 25 16:34:19 MK-Soft-VM3 sshd[3470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.16.18 Nov 25 16:34:21 MK-Soft-VM3 sshd[3470]: Failed password for invalid user foo from 103.66.16.18 port 59796 ssh2 ... |
2019-11-26 04:27:48 |
| 123.111.18.242 | attackbots | 11/25/2019-15:32:02.058410 123.111.18.242 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-26 04:40:46 |
| 175.4.195.224 | attackspambots | Connection by 175.4.195.224 on port: 23 got caught by honeypot at 11/25/2019 1:31:56 PM |
2019-11-26 04:51:35 |
| 189.8.211.136 | attackspambots | Unauthorized connection attempt from IP address 189.8.211.136 on Port 445(SMB) |
2019-11-26 04:36:39 |
| 139.199.113.236 | attackbotsspam | Nov 25 04:32:45 sachi sshd\[21528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.236 user=root Nov 25 04:32:47 sachi sshd\[21528\]: Failed password for root from 139.199.113.236 port 39898 ssh2 Nov 25 04:32:53 sachi sshd\[21546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.236 user=root Nov 25 04:32:55 sachi sshd\[21546\]: Failed password for root from 139.199.113.236 port 40194 ssh2 Nov 25 04:32:57 sachi sshd\[21552\]: Invalid user pi from 139.199.113.236 |
2019-11-26 04:15:41 |
| 201.182.223.59 | attack | Nov 25 20:49:33 v22019058497090703 sshd[11296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.223.59 Nov 25 20:49:35 v22019058497090703 sshd[11296]: Failed password for invalid user haferburns from 201.182.223.59 port 52252 ssh2 Nov 25 20:57:22 v22019058497090703 sshd[12108]: Failed password for root from 201.182.223.59 port 60798 ssh2 ... |
2019-11-26 04:22:49 |
| 185.234.216.206 | attack | 2019-11-25T18:21:27.391519MailD postfix/smtpd[4544]: warning: unknown[185.234.216.206]: SASL LOGIN authentication failed: authentication failure 2019-11-25T18:40:14.035220MailD postfix/smtpd[5895]: warning: unknown[185.234.216.206]: SASL LOGIN authentication failed: authentication failure 2019-11-25T18:57:46.607581MailD postfix/smtpd[6687]: warning: unknown[185.234.216.206]: SASL LOGIN authentication failed: authentication failure |
2019-11-26 04:42:18 |
| 221.229.116.230 | attackspambots | Fail2Ban Ban Triggered |
2019-11-26 04:28:13 |
| 201.211.152.187 | attackspam | Unauthorized connection attempt from IP address 201.211.152.187 on Port 445(SMB) |
2019-11-26 04:49:13 |
| 51.254.115.80 | attackspambots | 11/25/2019-15:14:23.495816 51.254.115.80 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-26 04:21:37 |
| 219.250.188.2 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-26 04:41:36 |