Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: EE

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '178.104.128.0 - 178.104.143.255'

% Abuse contact for '178.104.128.0 - 178.104.143.255' is 'abuse@hetzner.com'

inetnum:        178.104.128.0 - 178.104.143.255
netname:        CLOUD-NBG1
country:        DE
remarks:        INFRA-AW
admin-c:        HOAC1-RIPE
tech-c:         HOAC1-RIPE
status:         ASSIGNED PA
created:        2026-03-31T15:46:22Z
last-modified:  2026-03-31T15:46:22Z
source:         RIPE
mnt-by:         HOS-GUN

role:           Hetzner Online GmbH - Contact Role
address:        Hetzner Online GmbH
address:        Industriestrasse 25
address:        D-91710 Gunzenhausen
address:        Germany
phone:          +49 9831 505-0
fax-no:         +49 9831 505-3
abuse-mailbox:  abuse@hetzner.com
remarks:        *************************************************
remarks:        * For spam/abuse/security issues please contact *
remarks:        * abuse@hetzner.com, or fill out the form at *
remarks:        * abuse.hetzner.com, thank you. *
remarks:        *************************************************
remarks:
remarks:        *************************************************
remarks:        * Any questions on Peering please send to *
remarks:        * peering@hetzner.com *
remarks:        *************************************************
org:            ORG-HOA1-RIPE
admin-c:        MH375-RIPE
tech-c:         GM834-RIPE
tech-c:         SK2374-RIPE
tech-c:         MF1400-RIPE
tech-c:         SK8441-RIPE
tech-c:         DD15478-RIPE
nic-hdl:        HOAC1-RIPE
mnt-by:         HOS-GUN
created:        2004-08-12T09:40:20Z
last-modified:  2022-11-22T18:33:55Z
source:         RIPE # Filtered

% Information related to '178.104.0.0/15AS24940'

route:          178.104.0.0/15
descr:          HETZNER-DC
origin:         AS24940
org:            ORG-HOA1-RIPE
mnt-by:         HOS-GUN
created:        2026-02-18T10:38:45Z
last-modified:  2026-02-18T10:38:45Z
source:         RIPE

organisation:   ORG-HOA1-RIPE
org-name:       Hetzner Online GmbH
country:        DE
org-type:       LIR
address:        Industriestrasse 25
address:        D-91710
address:        Gunzenhausen
address:        GERMANY
phone:          +49 9831 5050
fax-no:         +49 9831 5053
admin-c:        MF1400-RIPE
admin-c:        GM834-RIPE
admin-c:        HOAC1-RIPE
admin-c:        MH375-RIPE
admin-c:        SK2374-RIPE
admin-c:        SK8441-RIPE
abuse-c:        HOAC1-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        HOS-GUN
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         HOS-GUN
created:        2004-04-17T11:07:58Z
last-modified:  2022-11-22T18:32:44Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.104.133.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;178.104.133.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040500 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 23:31:54 CST 2026
;; MSG SIZE  rcvd: 106
Host info
1.133.104.178.in-addr.arpa domain name pointer static.1.133.104.178.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.133.104.178.in-addr.arpa	name = static.1.133.104.178.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.183.139.74 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 06:08:53
180.163.220.43 attack
Automatic report - Banned IP Access
2020-02-29 06:09:58
93.84.86.69 attack
Feb 28 22:59:53  sshd\[12785\]: Invalid user kim from 93.84.86.69Feb 28 22:59:55  sshd\[12785\]: Failed password for invalid user kim from 93.84.86.69 port 39412 ssh2
...
2020-02-29 06:04:26
157.55.39.0 attack
Automatic report - Banned IP Access
2020-02-29 06:12:05
121.180.207.250 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 06:26:43
222.186.173.142 attackbots
Feb 28 17:12:43 plusreed sshd[16816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Feb 28 17:12:45 plusreed sshd[16816]: Failed password for root from 222.186.173.142 port 11028 ssh2
...
2020-02-29 06:14:30
37.193.175.55 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 05:55:44
201.48.82.49 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 05:55:16
187.151.203.230 attackspambots
Port probing on unauthorized port 23
2020-02-29 05:56:36
218.92.0.168 attack
Feb 29 06:21:58 bacztwo sshd[15540]: error: PAM: Authentication failure for root from 218.92.0.168
Feb 29 06:22:01 bacztwo sshd[15540]: error: PAM: Authentication failure for root from 218.92.0.168
Feb 29 06:22:04 bacztwo sshd[15540]: error: PAM: Authentication failure for root from 218.92.0.168
Feb 29 06:22:04 bacztwo sshd[15540]: Failed keyboard-interactive/pam for root from 218.92.0.168 port 7674 ssh2
Feb 29 06:21:55 bacztwo sshd[15540]: error: PAM: Authentication failure for root from 218.92.0.168
Feb 29 06:21:58 bacztwo sshd[15540]: error: PAM: Authentication failure for root from 218.92.0.168
Feb 29 06:22:01 bacztwo sshd[15540]: error: PAM: Authentication failure for root from 218.92.0.168
Feb 29 06:22:04 bacztwo sshd[15540]: error: PAM: Authentication failure for root from 218.92.0.168
Feb 29 06:22:04 bacztwo sshd[15540]: Failed keyboard-interactive/pam for root from 218.92.0.168 port 7674 ssh2
Feb 29 06:22:08 bacztwo sshd[15540]: error: PAM: Authentication failure for root from
...
2020-02-29 06:24:16
41.215.253.70 attackbotsspam
20/2/28@16:59:24: FAIL: Alarm-Network address from=41.215.253.70
20/2/28@16:59:24: FAIL: Alarm-Network address from=41.215.253.70
...
2020-02-29 06:26:09
14.63.167.192 attack
Feb 28 16:59:47 plusreed sshd[12909]: Invalid user sonarqube from 14.63.167.192
...
2020-02-29 06:10:58
159.203.176.82 attackspambots
ENG,WP GET /wp-login.php
2020-02-29 05:51:29
91.225.77.52 attack
Feb 28 22:44:21 pornomens sshd\[18622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.77.52  user=root
Feb 28 22:44:24 pornomens sshd\[18622\]: Failed password for root from 91.225.77.52 port 53914 ssh2
Feb 28 23:04:51 pornomens sshd\[18753\]: Invalid user yuchen from 91.225.77.52 port 57850
Feb 28 23:04:51 pornomens sshd\[18753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.77.52
...
2020-02-29 06:10:43
67.207.89.207 attack
Feb 28 22:34:49 lnxmysql61 sshd[21742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.89.207
2020-02-29 05:57:07

Recently Reported IPs

2606:4700:10::6814:9897 2606:4700:10::6814:7824 2606:4700:10::6814:5799 2606:4700:10::6814:5546
2606:4700:10::6814:7698 2606:4700:10::6814:9210 2606:4700:10::6816:4340 2606:4700:10::6816:3182
2606:4700:10::6814:5939 2606:4700:10::6816:1477 157.230.184.28 138.197.203.215
14.213.49.27 189.183.2.1 123.146.68.163 171.22.46.170
2606:4700:10::6816:4239 2606:4700:10::6814:5212 2606:4700:10::6816:3492 2606:4700:10::6816:1324