Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '193.100.96.0 - 193.100.123.255'

% Abuse contact for '193.100.96.0 - 193.100.123.255' is 'abuse.emea@verizon.com'

inetnum:        193.100.96.0 - 193.100.123.255
org:            ORG-UD1-RIPE
netname:        DE-EUNET-19941130
country:        DE
admin-c:        HE15-RIPE
admin-c:        WERT1-RIPE
tech-c:         HE15-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         UUNETDE-I
mnt-irt:        IRT-MCI-DE
created:        2020-10-23T08:38:09Z
last-modified:  2020-10-23T08:38:09Z
source:         RIPE # Filtered

organisation:   ORG-UD1-RIPE
org-name:       Verizon Deutschland GmbH
country:        DE
org-type:       LIR
address:        Sebrathweg 20
address:        44149
address:        Dortmund
address:        GERMANY
phone:          +49 231 972 1299
fax-no:         +49 231 972 2082
admin-c:        HSVZ-RIPE
admin-c:        FEM
admin-c:        AW-RIPE
admin-c:        VERT-RIPE
mnt-ref:        UUNETDE-I
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         UUNETDE-I
abuse-c:        AVE253-RIPE
created:        2004-04-17T11:07:10Z
last-modified:  2025-11-24T16:54:46Z
source:         RIPE # Filtered

role:           Hostmaster UUNET Deutschland
address:        Verizon Deutschland GmbH
address:        Sebrathweg 20
address:        44149 Dortmund
address:        Germany
phone:          +49 231 972 0
fax-no:         +49 231 972 2083
admin-c:        AW-RIPE
admin-c:        FEM
tech-c:         AW-RIPE
tech-c:         FEM
nic-hdl:        HE15-RIPE
remarks:        role account for Hostmaster at de.uu.net
remarks:        could be Andreas Wittkemper, Frank Eckermann
remarks:        e-mail : ipam@verizon.com
mnt-by:         UUNET-P
created:        2002-04-08T11:06:47Z
last-modified:  2024-07-04T14:04:52Z
source:         RIPE # Filtered

role:           Verizon EMEA Registrar Team
address:        Verizon Deutschland GmbH
address:        44149 Dortmund
address:        Germany
phone:          +49 231 972 0
fax-no:         +49 231 972 2083
admin-c:        AW-RIPE
admin-c:        FEM
abuse-mailbox:  abuse@uk.verizon.com
admin-c:        SRM88-RIPE
admin-c:        HSVZ-RIPE
tech-c:         AW-RIPE
tech-c:         FEM
tech-c:         SRM88-RIPE
tech-c:         HSVZ-RIPE
nic-hdl:        WERT1-RIPE
mnt-by:         AS1849-MNT
created:        2003-02-02T18:50:09Z
last-modified:  2022-07-14T11:48:35Z
source:         RIPE # Filtered

% Information related to '193.100.96.0/20AS702'

route:          193.100.96.0/20
origin:         AS702
mnt-by:         WCOM-EMEA-RICE-MNT
created:        2020-06-18T12:28:45Z
last-modified:  2020-06-18T12:28:45Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.100.110.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.100.110.121.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 07:09:55 CST 2026
;; MSG SIZE  rcvd: 108
Host info
b'Host 121.110.100.193.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.110.100.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.199.195 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-07-20 09:58:07
104.131.59.173 attack
10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined
node-superagent/4.1.0
2019-07-20 09:43:15
80.55.135.25 attackspam
TCP port 25 (SMTP) attempt blocked by hMailServer IP-check. Abuse score 31%
2019-07-20 09:33:17
185.234.216.99 attackspam
2019-07-20T06:41:54.240034ns1.unifynetsol.net postfix/smtpd\[13300\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-20T06:48:42.378240ns1.unifynetsol.net postfix/smtpd\[14010\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-20T06:55:27.810808ns1.unifynetsol.net postfix/smtpd\[14715\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-20T07:02:12.112904ns1.unifynetsol.net postfix/smtpd\[16158\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-20T07:08:56.242908ns1.unifynetsol.net postfix/smtpd\[16862\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-20 09:54:36
165.22.26.231 attackspambots
165.22.26.231 - - [20/Jul/2019:03:39:05 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-07-20 09:50:58
120.59.147.148 attackspam
Automatic report - Port Scan Attack
2019-07-20 09:51:31
101.71.2.111 attackbots
Jul 19 21:43:33 plusreed sshd[29526]: Invalid user system from 101.71.2.111
...
2019-07-20 09:53:59
194.247.173.123 attack
20 attempts against mh-misbehave-ban on flare.magehost.pro
2019-07-20 09:24:14
177.223.103.244 attackspambots
2019-07-08T09:46:54.019653wiz-ks3 sshd[16475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.223.103.244.txfiber.net.br  user=root
2019-07-08T09:46:55.936365wiz-ks3 sshd[16475]: Failed password for root from 177.223.103.244 port 56451 ssh2
2019-07-08T09:46:57.846696wiz-ks3 sshd[16475]: Failed password for root from 177.223.103.244 port 56451 ssh2
2019-07-08T09:46:54.019653wiz-ks3 sshd[16475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.223.103.244.txfiber.net.br  user=root
2019-07-08T09:46:55.936365wiz-ks3 sshd[16475]: Failed password for root from 177.223.103.244 port 56451 ssh2
2019-07-08T09:46:57.846696wiz-ks3 sshd[16475]: Failed password for root from 177.223.103.244 port 56451 ssh2
2019-07-08T09:46:54.019653wiz-ks3 sshd[16475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.223.103.244.txfiber.net.br  user=root
2019-07-08T09:46:55.936365wiz-ks3 sshd[16475]: Failed pas
2019-07-20 10:10:41
192.40.115.49 attackspambots
WP_xmlrpc_attack
2019-07-20 09:31:41
173.249.41.90 attackspambots
2019-07-15T07:40:06.449366wiz-ks3 sshd[18669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi203823.contaboserver.net  user=root
2019-07-15T07:40:08.563882wiz-ks3 sshd[18669]: Failed password for root from 173.249.41.90 port 38942 ssh2
2019-07-15T07:40:15.364589wiz-ks3 sshd[18671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi203823.contaboserver.net  user=root
2019-07-15T07:40:17.047580wiz-ks3 sshd[18671]: Failed password for root from 173.249.41.90 port 35742 ssh2
2019-07-15T07:40:24.482933wiz-ks3 sshd[18673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi203823.contaboserver.net  user=root
2019-07-15T07:40:26.401739wiz-ks3 sshd[18673]: Failed password for root from 173.249.41.90 port 60830 ssh2
2019-07-15T07:40:33.414983wiz-ks3 sshd[18675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi203823.contaboserver.net  user=root
2019-07
2019-07-20 10:11:53
185.189.51.218 attack
WP_xmlrpc_attack
2019-07-20 09:33:35
50.62.208.212 attackbots
WP_xmlrpc_attack
2019-07-20 09:28:58
183.131.82.103 attackspam
20.07.2019 00:39:22 SSH access blocked by firewall
2019-07-20 09:41:50
182.61.33.2 attack
Jul 19 19:34:03 MK-Soft-Root2 sshd\[2040\]: Invalid user odoo from 182.61.33.2 port 54850
Jul 19 19:34:03 MK-Soft-Root2 sshd\[2040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.2
Jul 19 19:34:05 MK-Soft-Root2 sshd\[2040\]: Failed password for invalid user odoo from 182.61.33.2 port 54850 ssh2
...
2019-07-20 09:27:25

Recently Reported IPs

212.106.121.27 149.7.140.62 148.57.146.44 141.213.8.22
125.17.121.250 119.93.12.223 121.160.73.75 129.46.42.145
114.170.171.243 107.80.174.117 192.71.171.180 220.103.180.243
189.124.22.175 148.60.121.63 139.170.148.54 157.65.71.96
103.28.224.162 103.131.219.97 10.87.231.118 10.80.168.235