City: Halle (Saale)
Region: Sachsen-Anhalt
Country: Germany
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '188.103.0.0 - 188.103.255.255'
% Abuse contact for '188.103.0.0 - 188.103.255.255' is 'abuse.de@vodafone.com'
inetnum: 188.103.0.0 - 188.103.255.255
netname: ARCOR-DSL-NET19
descr: ARCOR AG
descr: Alfred-Herrhausen-Allee 1
descr: D-65760 Eschborn
country: DE
admin-c: ANOC1-RIPE
tech-c: ANOC1-RIPE
mnt-by: ARCOR-MNT
mnt-lower: ARCOR-MNT
mnt-routes: ARCOR-MNT
status: ASSIGNED PA
created: 2009-03-23T07:00:38Z
last-modified: 2009-03-23T07:00:38Z
source: RIPE
role: Vodafone Germany IP Core Backbone
address: Vodafone GmbH
address: Campus Eschborn
address: Duesseldorfer Strasse 15
address: D-65760 Eschborn
address: Germany
phone: +49 6196 52352105
remarks: trouble: Security issues abuse.de@vodafone.com
remarks: trouble: Information http://www.vodafone.de
remarks: trouble: Peering contact peering@adm.arcor.net
remarks: trouble: Operational issues :
remarks: DanubiusNOC-DE-FO-FIXED_ro@vodafone.com
remarks: trouble: Address assignment ip-registry@arcor.net
admin-c: SM9000-RIPE
admin-c: NH4266-RIPE
admin-c: JS19072-RIPE
admin-c: IE1226-RIPE
admin-c: TK11590-RIPE
admin-c: FB3293-RIPE
admin-c: TG2269-RIPE
tech-c: NH15-RIPE
nic-hdl: ANOC1-RIPE
mnt-by: ARCOR-MNT
created: 2002-07-11T08:48:33Z
last-modified: 2025-01-20T12:18:04Z
source: RIPE # Filtered
abuse-mailbox: abuse.de@vodafone.com
% Information related to '188.102.0.0/15AS3209'
route: 188.102.0.0/15
descr: ARCOR-IP
origin: AS3209
mnt-by: ARCOR-MNT
created: 2009-01-29T08:43:05Z
last-modified: 2010-12-03T09:04:12Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.103.232.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;188.103.232.114. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 07:00:34 CST 2026
;; MSG SIZE rcvd: 108
114.232.103.188.in-addr.arpa domain name pointer dslb-188-103-232-114.188.103.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
114.232.103.188.in-addr.arpa name = dslb-188-103-232-114.188.103.pools.vodafone-ip.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 62.234.152.218 | attackspam | Mar 11 23:49:05 mail sshd\[43514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218 user=root ... |
2020-03-12 17:44:18 |
| 36.26.64.143 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.64.143 user=root Failed password for root from 36.26.64.143 port 60837 ssh2 Invalid user postgres from 36.26.64.143 port 53617 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.64.143 Failed password for invalid user postgres from 36.26.64.143 port 53617 ssh2 |
2020-03-12 18:10:51 |
| 178.62.99.41 | attackspambots | Invalid user thorstenschwarz from 178.62.99.41 port 60308 |
2020-03-12 18:12:23 |
| 111.67.77.170 | attackspambots | 2020-03-11T21:49:17.797628linuxbox-skyline sshd[47615]: Invalid user Administrator from 111.67.77.170 port 63142 ... |
2020-03-12 17:36:59 |
| 45.55.177.230 | attackbotsspam | Automatic report: SSH brute force attempt |
2020-03-12 18:02:18 |
| 122.51.191.69 | attack | Mar 12 08:00:29 localhost sshd\[7232\]: Invalid user panyongjia from 122.51.191.69 port 52248 Mar 12 08:00:29 localhost sshd\[7232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.191.69 Mar 12 08:00:30 localhost sshd\[7232\]: Failed password for invalid user panyongjia from 122.51.191.69 port 52248 ssh2 |
2020-03-12 17:48:02 |
| 92.247.142.182 | attackspambots | Absender hat Spam-Falle ausgel?st |
2020-03-12 18:18:51 |
| 176.119.141.79 | attack | B: Magento admin pass test (wrong country) |
2020-03-12 18:19:23 |
| 45.133.99.2 | attack | Mar 12 11:06:25 mailserver postfix/smtps/smtpd[85338]: connect from unknown[45.133.99.2] Mar 12 11:06:31 mailserver dovecot: auth-worker(85314): sql([hidden],45.133.99.2): unknown user Mar 12 11:06:33 mailserver postfix/smtps/smtpd[85338]: warning: unknown[45.133.99.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 12 11:06:33 mailserver postfix/smtps/smtpd[85338]: lost connection after AUTH from unknown[45.133.99.2] Mar 12 11:06:33 mailserver postfix/smtps/smtpd[85338]: disconnect from unknown[45.133.99.2] Mar 12 11:06:33 mailserver postfix/smtps/smtpd[85338]: connect from unknown[45.133.99.2] Mar 12 11:06:41 mailserver postfix/smtps/smtpd[85350]: connect from unknown[45.133.99.2] Mar 12 11:06:42 mailserver postfix/smtps/smtpd[85338]: lost connection after AUTH from unknown[45.133.99.2] Mar 12 11:06:42 mailserver postfix/smtps/smtpd[85338]: disconnect from unknown[45.133.99.2] Mar 12 11:06:48 mailserver dovecot: auth-worker(85314): sql(gyroy,45.133.99.2): unknown user |
2020-03-12 18:09:08 |
| 185.156.73.45 | attack | Mar 12 10:51:35 debian-2gb-nbg1-2 kernel: \[6265834.336858\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.45 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=17213 PROTO=TCP SPT=55081 DPT=13028 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-12 18:22:02 |
| 31.199.193.162 | attack | Failed password for root from 31.199.193.162 port 15409 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.199.193.162 user=root Failed password for root from 31.199.193.162 port 60503 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.199.193.162 user=root Failed password for root from 31.199.193.162 port 1161 ssh2 |
2020-03-12 17:54:58 |
| 185.176.27.42 | attack | Mar 12 09:48:05 debian-2gb-nbg1-2 kernel: \[6262024.275559\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=39329 PROTO=TCP SPT=56630 DPT=8576 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-12 17:56:29 |
| 212.64.19.123 | attack | SSH Brute Force |
2020-03-12 18:02:39 |
| 178.171.123.141 | attackspambots | Chat Spam |
2020-03-12 17:57:23 |
| 52.163.200.206 | attackbotsspam | Invalid user user1 from 52.163.200.206 port 51842 |
2020-03-12 18:03:30 |