Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lauterbourg

Region: Grand Est

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '185.222.242.0 - 185.222.242.255'

% Abuse contact for '185.222.242.0 - 185.222.242.255' is 'abuse@contabo.de'

inetnum:        185.222.242.0 - 185.222.242.255
netname:        TT-2021111015
descr:          Contabo GmbH
country:        DE
org:            ORG-CG313-RIPE
admin-c:        MH7476-RIPE
tech-c:         MH7476-RIPE
abuse-c:        MH12453-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-CONTABO
created:        2021-11-21T10:13:26Z
last-modified:  2021-11-21T11:51:50Z
source:         RIPE

organisation:   ORG-CG313-RIPE
org-name:       Contabo GmbH
org-type:       other
remarks:        * Please direct all complaints about Internet abuse like Spam, hacking or scans *
remarks:        * to abuse@contabo.de . This will guarantee fastest processing possible. *
address:        Welfenstrasse 22
address:        81541
address:        Munchen
address:        GERMANY
phone:          +498921268372
fax-no:         +498921665862
abuse-c:        MH12453-RIPE
mnt-ref:        MNT-CONTABO
mnt-by:         MNT-CONTABO
mnt-ref:        de-buechvps1-1-mnt
mnt-ref:        mnt-de-bnc-1
mnt-by:         de-buechvps1-1-mnt
mnt-by:         mnt-de-bnc-1
created:        2021-09-29T14:30:02Z
last-modified:  2025-11-26T16:22:44Z
source:         RIPE # Filtered

person:         Johannes Selg
address:        Contabo GmbH
address:        Welfenstr. 22
address:        81541 Mnchen
phone:          +49 89 21268372
fax-no:         +49 89 21665862
nic-hdl:        MH7476-RIPE
mnt-by:         MNT-CONTABO
mnt-by:         MNT-GIGA-HOSTING
created:        2010-01-04T10:41:37Z
last-modified:  2025-12-05T12:12:21Z
source:         RIPE

% Information related to '185.222.242.0/24AS51167'

route:          185.222.242.0/24
descr:          CONTABO
origin:         AS51167
mnt-by:         MNT-CONTABO
created:        2021-11-21T10:13:26Z
last-modified:  2021-11-21T11:51:58Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.222.242.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.222.242.172.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042901 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 04:30:25 CST 2026
;; MSG SIZE  rcvd: 108
Host info
172.242.222.185.in-addr.arpa domain name pointer vmi3259564.contaboserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
172.242.222.185.in-addr.arpa	name = vmi3259564.contaboserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.83.144.142 attack
Unauthorized connection attempt from IP address 183.83.144.142 on Port 445(SMB)
2019-10-06 02:51:35
201.204.168.47 attackbots
Automatic report - Port Scan Attack
2019-10-06 02:49:13
211.107.161.236 attackbotsspam
Oct  5 19:34:39 v22018076622670303 sshd\[14725\]: Invalid user pi from 211.107.161.236 port 45530
Oct  5 19:34:39 v22018076622670303 sshd\[14726\]: Invalid user pi from 211.107.161.236 port 45532
Oct  5 19:34:40 v22018076622670303 sshd\[14725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.107.161.236
...
2019-10-06 02:52:19
170.210.52.126 attack
Oct  5 18:18:44 game-panel sshd[14242]: Failed password for root from 170.210.52.126 port 47781 ssh2
Oct  5 18:21:58 game-panel sshd[14328]: Failed password for root from 170.210.52.126 port 60081 ssh2
2019-10-06 02:39:15
223.16.216.92 attack
Oct  5 02:40:13 auw2 sshd\[26422\]: Invalid user Immobilien123 from 223.16.216.92
Oct  5 02:40:13 auw2 sshd\[26422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.16.216.92
Oct  5 02:40:15 auw2 sshd\[26422\]: Failed password for invalid user Immobilien123 from 223.16.216.92 port 56958 ssh2
Oct  5 02:45:00 auw2 sshd\[26829\]: Invalid user Bedienung2017 from 223.16.216.92
Oct  5 02:45:00 auw2 sshd\[26829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.16.216.92
2019-10-06 03:00:15
45.169.141.130 attackspambots
Unauthorized connection attempt from IP address 45.169.141.130 on Port 445(SMB)
2019-10-06 02:58:24
186.46.252.58 attackspam
Oct  5 05:30:40 mail postfix/postscreen[166506]: PREGREET 47 after 0.67 from [186.46.252.58]:43639: EHLO 58.252.46.186.static.anycast.cnt-grms.ec

...
2019-10-06 02:49:30
198.108.67.62 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-10-06 03:04:05
36.153.23.177 attackspam
Oct  5 13:21:28 v22019058497090703 sshd[10570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.153.23.177
Oct  5 13:21:29 v22019058497090703 sshd[10570]: Failed password for invalid user 1QAZ2WSX3edc from 36.153.23.177 port 33896 ssh2
Oct  5 13:30:46 v22019058497090703 sshd[11339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.153.23.177
...
2019-10-06 02:43:23
185.110.127.26 attackbotsspam
2019-10-05T18:24:47.694623abusebot-3.cloudsearch.cf sshd\[26693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.110.127.26  user=root
2019-10-06 02:45:12
186.201.230.138 attackspambots
Unauthorized connection attempt from IP address 186.201.230.138 on Port 445(SMB)
2019-10-06 02:53:11
45.125.65.80 attackbots
Oct  5 16:46:14 heicom postfix/smtpd\[7621\]: warning: unknown\[45.125.65.80\]: SASL LOGIN authentication failed: authentication failure
Oct  5 17:13:40 heicom postfix/smtpd\[7621\]: warning: unknown\[45.125.65.80\]: SASL LOGIN authentication failed: authentication failure
Oct  5 17:40:59 heicom postfix/smtpd\[11162\]: warning: unknown\[45.125.65.80\]: SASL LOGIN authentication failed: authentication failure
Oct  5 18:08:21 heicom postfix/smtpd\[10637\]: warning: unknown\[45.125.65.80\]: SASL LOGIN authentication failed: authentication failure
Oct  5 18:35:08 heicom postfix/smtpd\[14355\]: warning: unknown\[45.125.65.80\]: SASL LOGIN authentication failed: authentication failure
...
2019-10-06 02:41:58
107.170.246.89 attackbots
Oct  5 20:25:44 vps01 sshd[7335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.246.89
Oct  5 20:25:46 vps01 sshd[7335]: Failed password for invalid user 1z2x3c4v from 107.170.246.89 port 53132 ssh2
2019-10-06 02:47:06
113.87.194.151 attackbots
Unauthorized connection attempt from IP address 113.87.194.151 on Port 445(SMB)
2019-10-06 02:48:26
118.163.73.116 attackspam
Unauthorized connection attempt from IP address 118.163.73.116 on Port 445(SMB)
2019-10-06 02:57:36

Recently Reported IPs

2606:4700:10::6814:4670 43.165.198.224 211.23.209.210 2606:4700:10::6816:3917
62.171.169.207 164.219.5.0 2606:4700:10::6816:1010 2606:4700:10::6816:1926
185.177.238.46 8.209.91.142 3.66.157.104 14.213.12.49
129.93.72.100 100.53.142.60 110.77.226.199 2606:4700:10::6814:6088
52.90.41.108 170.130.204.58 2606:4700:10::6816:388d 2606:4700:10::6814:5191