City: Verden
Region: Niedersachsen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '193.124.144.0 - 193.124.151.255'
% Abuse contact for '193.124.144.0 - 193.124.151.255' is 'abuse@bungalski.de'
inetnum: 193.124.144.0 - 193.124.151.255
netname: DE-BUNGALSKI-19930901
country: de
org: ORG-MBG8-RIPE
admin-c: MBGN1-RIPE
tech-c: MBGN1-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-BUNG
created: 2015-10-20T08:46:58Z
last-modified: 2024-09-12T17:38:11Z
source: RIPE
descr: Marco Bungalski GmbH
organisation: ORG-MBG8-RIPE
org-name: Marco Bungalski GmbH
country: DE
org-type: LIR
address: Claerenore-Stinnes-Strasse 2
address: 27283
address: Verden
address: GERMANY
phone: +4942317769999
fax-no: +4942317769998
abuse-c: MBGN1-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: MNT-BUNG
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-BUNG
created: 2013-09-19T08:48:27Z
last-modified: 2020-12-16T12:58:07Z
source: RIPE # Filtered
role: MARCO BUNGALSKI GMBH NOC
address: Marco Bungalski GmbH
address: Claerenore-Stinnes-Strasse 2
address: 27283 Verden
address: Germany
remarks: For abuse and spam issues please use
remarks: only abuse@bungalski.de
abuse-mailbox: abuse@bungalski.de
phone: +49 4231 7769999
fax-no: +49 4231 7769998
nic-hdl: MBGN1-RIPE
mnt-by: MNT-BUNG
created: 2013-09-21T13:59:11Z
last-modified: 2018-04-24T19:55:43Z
source: RIPE # Filtered
% Information related to '193.124.144.0/21AS59790'
route: 193.124.144.0/21
descr: Marco Bungalski GmbH
origin: AS59790
mnt-by: MNT-BUNG
created: 2017-01-20T11:03:22Z
last-modified: 2020-02-05T14:18:04Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.124.146.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.124.146.204. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:01:50 CST 2026
;; MSG SIZE rcvd: 108
Host 204.146.124.193.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 204.146.124.193.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.143.74.108 | attackbotsspam | May 29 11:04:35 relay postfix/smtpd\[17499\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 29 11:04:53 relay postfix/smtpd\[12955\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 29 11:06:09 relay postfix/smtpd\[20032\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 29 11:06:25 relay postfix/smtpd\[13951\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 29 11:07:47 relay postfix/smtpd\[17490\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-29 17:11:46 |
| 87.101.72.81 | attack | May 29 09:38:11 nextcloud sshd\[24488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.72.81 user=root May 29 09:38:13 nextcloud sshd\[24488\]: Failed password for root from 87.101.72.81 port 60479 ssh2 May 29 09:52:57 nextcloud sshd\[20599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.72.81 user=root |
2020-05-29 16:40:54 |
| 122.117.210.119 | attackspambots | port 23 |
2020-05-29 16:52:17 |
| 115.231.157.179 | attackbotsspam | Invalid user owen from 115.231.157.179 port 42640 |
2020-05-29 17:26:20 |
| 103.242.56.174 | attackbots | web-1 [ssh_2] SSH Attack |
2020-05-29 17:07:31 |
| 192.241.185.120 | attackspambots | $f2bV_matches |
2020-05-29 16:52:42 |
| 182.61.130.51 | attackspam | Invalid user maruszewski from 182.61.130.51 port 33284 |
2020-05-29 17:19:13 |
| 193.112.111.28 | attackspam | May 29 03:51:12 scw-6657dc sshd[28237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.111.28 user=root May 29 03:51:12 scw-6657dc sshd[28237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.111.28 user=root May 29 03:51:14 scw-6657dc sshd[28237]: Failed password for root from 193.112.111.28 port 53458 ssh2 ... |
2020-05-29 16:50:30 |
| 173.82.238.70 | attackspam | SpamScore above: 10.0 |
2020-05-29 17:09:49 |
| 45.227.254.30 | attackbots | 490/tcp 8520/tcp 9630/tcp... [2020-03-28/05-29]991pkt,298pt.(tcp) |
2020-05-29 17:05:23 |
| 175.37.81.151 | attack | RDPBruteGSL |
2020-05-29 17:21:53 |
| 201.148.87.82 | attack | (sshd) Failed SSH login from 201.148.87.82 (MX/Mexico/mail.barmex.com.mx): 5 in the last 3600 secs |
2020-05-29 16:46:58 |
| 103.45.161.100 | attackbotsspam | ... |
2020-05-29 17:26:39 |
| 51.68.198.113 | attackbots | 2020-05-29 10:16:36,034 fail2ban.actions: WARNING [ssh] Ban 51.68.198.113 |
2020-05-29 16:40:40 |
| 157.230.239.99 | attackbotsspam | Invalid user squid from 157.230.239.99 port 37786 |
2020-05-29 16:41:25 |