City: Nürnberg
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 146.19.3.0 - 146.19.255.255
CIDR: 146.19.3.0/24, 146.19.64.0/18, 146.19.128.0/17, 146.19.32.0/19, 146.19.16.0/20, 146.19.4.0/22, 146.19.8.0/21
NetName: RIPE-ERX-146-19-0-0
NetHandle: NET-146-19-3-0-1
Parent: NET146 (NET-146-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2004-02-04
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/146.19.3.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.19.215.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;146.19.215.93. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 20:01:38 CST 2026
;; MSG SIZE rcvd: 106
Host 93.215.19.146.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 93.215.19.146.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 12.218.98.102 | attackbots | Unauthorized connection attempt detected from IP address 12.218.98.102 to port 88 [J] |
2020-01-07 19:39:48 |
| 122.116.12.110 | attackbots | Unauthorized connection attempt detected from IP address 122.116.12.110 to port 2220 [J] |
2020-01-07 19:23:37 |
| 73.55.175.138 | attackspambots | Unauthorized connection attempt detected from IP address 73.55.175.138 to port 23 [J] |
2020-01-07 19:33:53 |
| 41.38.133.110 | attack | Unauthorized connection attempt detected from IP address 41.38.133.110 to port 4567 [J] |
2020-01-07 19:38:54 |
| 177.67.94.73 | attack | Unauthorized connection attempt detected from IP address 177.67.94.73 to port 80 [J] |
2020-01-07 19:46:57 |
| 109.232.51.174 | attack | Unauthorized connection attempt detected from IP address 109.232.51.174 to port 88 [J] |
2020-01-07 19:28:11 |
| 42.247.5.68 | attackbots | Unauthorized connection attempt detected from IP address 42.247.5.68 to port 1433 [J] |
2020-01-07 19:38:05 |
| 93.42.255.250 | attack | Unauthorized connection attempt detected from IP address 93.42.255.250 to port 80 [J] |
2020-01-07 20:01:47 |
| 114.34.44.19 | attack | Unauthorized connection attempt detected from IP address 114.34.44.19 to port 81 [J] |
2020-01-07 19:56:40 |
| 97.64.250.178 | attack | Jan 7 12:15:27 lnxded64 sshd[4548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.64.250.178 |
2020-01-07 20:01:09 |
| 223.97.23.208 | attackspambots | Unauthorized connection attempt detected from IP address 223.97.23.208 to port 23 [T] |
2020-01-07 19:40:54 |
| 77.45.116.45 | attackspam | Unauthorized connection attempt detected from IP address 77.45.116.45 to port 8080 [J] |
2020-01-07 19:32:37 |
| 114.67.80.209 | attack | Jan 7 08:46:27 vps46666688 sshd[14831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.209 Jan 7 08:46:30 vps46666688 sshd[14831]: Failed password for invalid user gkd from 114.67.80.209 port 42436 ssh2 ... |
2020-01-07 19:55:49 |
| 103.56.157.70 | attackbotsspam | Unauthorized connection attempt detected from IP address 103.56.157.70 to port 6379 [J] |
2020-01-07 19:29:18 |
| 106.12.178.62 | attackspambots | Unauthorized connection attempt detected from IP address 106.12.178.62 to port 2220 [J] |
2020-01-07 19:59:17 |