Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '37.148.208.0 - 37.148.215.255'

% Abuse contact for '37.148.208.0 - 37.148.215.255' is 'abuse@cizgi.net.tr'

inetnum:        37.148.208.0 - 37.148.215.255
netname:        TR-CIZGI-20120307
country:        TR
org:            ORG-CBSS1-RIPE
admin-c:        CAC973-RIPE
tech-c:         CTC973-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         CIZGI-MNT
mnt-domains:    CIZGI-MNT
mnt-routes:     CIZGI-MNT
created:        2012-03-07T11:04:25Z
last-modified:  2016-09-30T10:51:25Z
source:         RIPE # Filtered

organisation:   ORG-CBSS1-RIPE
org-name:       CIZGI TELEKOMUNIKASYON ANONIM SIRKETI
country:        TR
org-type:       LIR
address:        Kustepe Mah. Mecidiyekoy Yolu Trump Tower No:12
                Ic Kapi No:470 Sisli
address:        34387
address:        ISTANBUL
address:        TURKEY
phone:          +902122131213
fax-no:         +902123564407
admin-c:        HC973-RIPE
admin-c:        CTBG2-RIPE
admin-c:        NTR976-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        CIZGI-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         CIZGI-MNT
abuse-c:        CTA12-RIPE
created:        2005-02-23T10:03:43Z
last-modified:  2025-10-27T10:39:13Z
source:         RIPE # Filtered

person:         Administrative Contact
address:        Cizgi Telekom A.S.
address:        Kustepe Mah. Mecidiyekoy Yolu Trump Tower No:12 Ic Kapi No:470 Sisli
address:        34387 Istanbul - Turkey
phone:          +90 212 213 1214
fax-no:         +90 212 356 4407
nic-hdl:        CAC973-RIPE
mnt-by:         CIZGI-MNT
created:        2010-05-05T09:03:01Z
last-modified:  2025-12-30T10:43:30Z
source:         RIPE # Filtered

person:         Technical Contact
address:        Cizgi Telekomun A.S.
address:        Gulbahar Mah. Elif Sok. No:4 Kat:1 SISLI
address:        Istanbul - Turkey
phone:          +90 212 213 1213
fax-no:         +90 212 356 4407
nic-hdl:        CTC973-RIPE
mnt-by:         CIZGI-MNT
created:        2010-05-05T09:03:40Z
last-modified:  2024-10-01T18:41:16Z
source:         RIPE # Filtered

% Information related to '37.148.214.0/24AS34619'

route:          37.148.214.0/24
descr:          Cizgi Telekom Network
origin:         AS34619
mnt-lower:      CIZGI-MNT
mnt-routes:     CIZGI-MNT
mnt-by:         CIZGI-MNT
created:        2012-03-07T14:51:17Z
last-modified:  2012-03-07T14:51:17Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.148.214.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;37.148.214.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 12:01:02 CST 2026
;; MSG SIZE  rcvd: 107
Host info
126.214.148.37.in-addr.arpa domain name pointer 37-148-214-126.cizgi.net.tr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.214.148.37.in-addr.arpa	name = 37-148-214-126.cizgi.net.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.52.217.57 attack
" "
2019-11-24 22:27:12
31.163.200.115 attackspam
Unauthorized connection attempt from IP address 31.163.200.115 on Port 445(SMB)
2019-11-24 22:33:47
142.112.118.71 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-24 22:02:58
172.94.53.132 attackbots
Nov 23 20:08:39 hpm sshd\[7677\]: Invalid user server from 172.94.53.132
Nov 23 20:08:39 hpm sshd\[7677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.132
Nov 23 20:08:42 hpm sshd\[7677\]: Failed password for invalid user server from 172.94.53.132 port 37753 ssh2
Nov 23 20:16:42 hpm sshd\[8409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.132  user=root
Nov 23 20:16:44 hpm sshd\[8409\]: Failed password for root from 172.94.53.132 port 56199 ssh2
2019-11-24 22:27:45
63.88.23.177 attack
63.88.23.177 was recorded 8 times by 5 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 8, 59, 532
2019-11-24 22:07:19
83.28.42.226 attackbots
23/tcp
[2019-11-24]1pkt
2019-11-24 22:26:44
142.93.222.197 attack
Nov 24 14:59:52 sbg01 sshd[22060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Nov 24 14:59:54 sbg01 sshd[22060]: Failed password for invalid user b34t3r from 142.93.222.197 port 57622 ssh2
Nov 24 15:03:42 sbg01 sshd[22100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-11-24 22:39:52
222.186.42.4 attack
2019-11-23 UTC: 6x - (6x)
2019-11-24 22:19:20
103.68.55.88 attackspam
Unauthorized connection attempt from IP address 103.68.55.88 on Port 445(SMB)
2019-11-24 22:40:10
194.44.246.130 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-11-24 22:11:24
209.17.97.106 attackbotsspam
209.17.97.106 was recorded 9 times by 8 hosts attempting to connect to the following ports: 5905,5907,135,5800,8081,5632,5289,161,5910. Incident counter (4h, 24h, all-time): 9, 29, 684
2019-11-24 22:34:06
118.126.64.37 attackbots
118.126.64.37 was recorded 5 times by 1 hosts attempting to connect to the following ports: 9200,6380,8088. Incident counter (4h, 24h, all-time): 5, 5, 15
2019-11-24 22:23:19
104.24.100.198 attack
TCP Port Scanning
2019-11-24 22:22:46
106.38.91.195 attack
Nov 24 15:03:58 andromeda postfix/smtpd\[52660\]: warning: unknown\[106.38.91.195\]: SASL LOGIN authentication failed: authentication failure
Nov 24 15:04:04 andromeda postfix/smtpd\[709\]: warning: unknown\[106.38.91.195\]: SASL LOGIN authentication failed: authentication failure
Nov 24 15:04:16 andromeda postfix/smtpd\[709\]: warning: unknown\[106.38.91.195\]: SASL LOGIN authentication failed: authentication failure
Nov 24 15:04:23 andromeda postfix/smtpd\[8614\]: warning: unknown\[106.38.91.195\]: SASL LOGIN authentication failed: authentication failure
Nov 24 15:04:30 andromeda postfix/smtpd\[709\]: warning: unknown\[106.38.91.195\]: SASL LOGIN authentication failed: authentication failure
2019-11-24 22:15:58
185.62.188.218 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/185.62.188.218/ 
 
 NL - 1H : (18)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NL 
 NAME ASN : ASN49349 
 
 IP : 185.62.188.218 
 
 CIDR : 185.62.188.0/24 
 
 PREFIX COUNT : 34 
 
 UNIQUE IP COUNT : 8704 
 
 
 ATTACKS DETECTED ASN49349 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-24 07:17:37 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-24 22:01:32

Recently Reported IPs

110.77.187.143 2606:4700:10::6816:4853 121.134.176.113 2606:4700:10::6816:353
2606:4700:10::6814:9837 2606:4700:10::6814:9903 14.207.194.27 10.116.128.178
185.247.137.23 14.1.105.214 2606:4700:10::6816:4123 2606:4700:10::ac43:1804
44.244.60.106 34.232.45.99 89.124.8.33 85.217.149.24
168.143.104.245 211.95.64.140 92.41.9.27 53.20.112.184