Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nürnberg

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       146.19.3.0 - 146.19.255.255
CIDR:           146.19.3.0/24, 146.19.64.0/18, 146.19.128.0/17, 146.19.32.0/19, 146.19.16.0/20, 146.19.4.0/22, 146.19.8.0/21
NetName:        RIPE-ERX-146-19-0-0
NetHandle:      NET-146-19-3-0-1
Parent:         NET146 (NET-146-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2004-02-04
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/146.19.3.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.19.215.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.19.215.93.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 20:01:38 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 93.215.19.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.215.19.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
12.218.98.102 attackbots
Unauthorized connection attempt detected from IP address 12.218.98.102 to port 88 [J]
2020-01-07 19:39:48
122.116.12.110 attackbots
Unauthorized connection attempt detected from IP address 122.116.12.110 to port 2220 [J]
2020-01-07 19:23:37
73.55.175.138 attackspambots
Unauthorized connection attempt detected from IP address 73.55.175.138 to port 23 [J]
2020-01-07 19:33:53
41.38.133.110 attack
Unauthorized connection attempt detected from IP address 41.38.133.110 to port 4567 [J]
2020-01-07 19:38:54
177.67.94.73 attack
Unauthorized connection attempt detected from IP address 177.67.94.73 to port 80 [J]
2020-01-07 19:46:57
109.232.51.174 attack
Unauthorized connection attempt detected from IP address 109.232.51.174 to port 88 [J]
2020-01-07 19:28:11
42.247.5.68 attackbots
Unauthorized connection attempt detected from IP address 42.247.5.68 to port 1433 [J]
2020-01-07 19:38:05
93.42.255.250 attack
Unauthorized connection attempt detected from IP address 93.42.255.250 to port 80 [J]
2020-01-07 20:01:47
114.34.44.19 attack
Unauthorized connection attempt detected from IP address 114.34.44.19 to port 81 [J]
2020-01-07 19:56:40
97.64.250.178 attack
Jan  7 12:15:27 lnxded64 sshd[4548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.64.250.178
2020-01-07 20:01:09
223.97.23.208 attackspambots
Unauthorized connection attempt detected from IP address 223.97.23.208 to port 23 [T]
2020-01-07 19:40:54
77.45.116.45 attackspam
Unauthorized connection attempt detected from IP address 77.45.116.45 to port 8080 [J]
2020-01-07 19:32:37
114.67.80.209 attack
Jan  7 08:46:27 vps46666688 sshd[14831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.209
Jan  7 08:46:30 vps46666688 sshd[14831]: Failed password for invalid user gkd from 114.67.80.209 port 42436 ssh2
...
2020-01-07 19:55:49
103.56.157.70 attackbotsspam
Unauthorized connection attempt detected from IP address 103.56.157.70 to port 6379 [J]
2020-01-07 19:29:18
106.12.178.62 attackspambots
Unauthorized connection attempt detected from IP address 106.12.178.62 to port 2220 [J]
2020-01-07 19:59:17

Recently Reported IPs

164.90.214.16 164.90.161.49 157.230.106.255 211.180.253.250
107.170.72.113 13.127.76.23 10.2.7.104 192.168.0.214
154.234.141.42 92.118.112.178 34.62.234.69 191.234.200.215
74.162.185.160 119.85.4.85 3.90.73.206 122.247.84.185
185.209.228.254 210.127.68.240 49.206.195.98 14.29.109.218