Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '193.29.192.0 - 193.29.199.255'

% Abuse contact for '193.29.192.0 - 193.29.199.255' is 'auftrag@nic.telekom.de'

inetnum:        193.29.192.0 - 193.29.199.255
netname:        TSI-SFPH-PI-NET
descr:          Duesseldorf
country:        DE
org:            ORG-SFPH1-RIPE
admin-c:        DK11042-RIPE
tech-c:         DK11042-RIPE
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         TSI-SFPH-MNT
mnt-by:         DTAG-NIC
mnt-routes:     DTAG-RR
mnt-by:         DE-TSBS-A-MNT
mnt-routes:     DE-TSBS-R-MNT
mnt-domains:    DTAG-NIC
mnt-domains:    TSI-SFPH-MNT
status:         ASSIGNED PI
created:        1970-01-01T00:00:00Z
last-modified:  2025-12-05T14:31:58Z
source:         RIPE
sponsoring-org: ORG-TDG1-RIPE

organisation:   ORG-SFPH1-RIPE
org-name:       Deutsche Telekom Healthcare and Solutions GmbH
country:        DE
org-type:       OTHER
address:        Muensterstrasse 261
address:        DE 40470 Duesseldorf
reg-nr:         District court Bonn HRB 20695
abuse-c:        AR28372-RIPE
mnt-ref:        TSI-SFPH-MNT
mnt-by:         TSI-SFPH-MNT
mnt-by:         DTAG-NIC
created:        2010-06-01T07:58:31Z
last-modified:  2026-04-29T07:14:38Z
source:         RIPE # Filtered

person:         Diana Kertscher
address:        T-Systems International GmbH
address:        Kaerrnerstrae 66
address:        04288 Leipzig
address:        DE
phone:          +49 341 1225276
nic-hdl:        DK11042-RIPE
mnt-by:         DTAG-NIC
created:        2025-12-05T14:30:27Z
last-modified:  2025-12-05T14:30:27Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.29.193.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.29.193.187.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 22:32:34 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 187.193.29.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 187.193.29.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.23.208.18 attackspam
Detected by Maltrail
2019-11-14 08:53:12
51.38.239.33 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: 33.ip-51-38-239.eu.
2019-11-14 09:13:34
198.71.240.27 attackspam
Detected by Maltrail
2019-11-14 08:58:27
59.25.197.130 attack
2019-11-14T04:57:16.610839abusebot-5.cloudsearch.cf sshd\[31893\]: Invalid user hp from 59.25.197.130 port 53472
2019-11-14 13:00:17
128.199.202.212 attackspambots
Detected by Maltrail
2019-11-14 09:08:08
5.189.187.237 attack
Detected by Maltrail
2019-11-14 09:15:39
185.151.6.252 attackbotsspam
Nov 14 01:39:24 server sshd\[19350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.6.252  user=root
Nov 14 01:39:26 server sshd\[19350\]: Failed password for root from 185.151.6.252 port 49114 ssh2
Nov 14 01:56:44 server sshd\[23947\]: Invalid user orner from 185.151.6.252
Nov 14 01:56:44 server sshd\[23947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.6.252 
Nov 14 01:56:46 server sshd\[23947\]: Failed password for invalid user orner from 185.151.6.252 port 49768 ssh2
...
2019-11-14 09:28:14
37.59.63.219 attackbotsspam
Detected by Maltrail
2019-11-14 09:14:41
80.211.85.67 attackbots
Detected by Maltrail
2019-11-14 08:54:55
5.189.163.253 attack
CloudCIX Reconnaissance Scan Detected, PTR: vmi196044.contaboserver.net.
2019-11-14 09:15:59
175.198.167.215 attack
23/tcp
[2019-11-13]1pkt
2019-11-14 09:17:16
178.128.234.200 attackspam
Detected by Maltrail
2019-11-14 09:02:38
90.198.167.55 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 08:54:44
51.38.238.165 attack
Nov 13 19:53:24 firewall sshd[6607]: Failed password for invalid user hiperg from 51.38.238.165 port 38254 ssh2
Nov 13 19:56:51 firewall sshd[6696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165  user=root
Nov 13 19:56:53 firewall sshd[6696]: Failed password for root from 51.38.238.165 port 46634 ssh2
...
2019-11-14 09:24:03
89.248.168.202 attack
89.248.168.202 was recorded 54 times by 19 hosts attempting to connect to the following ports: 52389,50389,59389,57389,55389,56389,54389,51389,58389. Incident counter (4h, 24h, all-time): 54, 393, 4001
2019-11-14 09:27:28

Recently Reported IPs

135.237.126.219 2606:4700:10::6814:9108 47.94.138.70 143.244.145.240
223.104.41.107 104.28.235.57 38.54.95.4 223.86.52.157
193.29.139.137 190.194.63.209 43.162.103.213 159.223.206.234
2606:4700:10::6814:6114 2606:4700:10::6814:7014 2606:4700:10::6814:4492 2606:4700:10::6814:4520
54.192.18.114 15.156.231.53 13.33.183.19 18.65.216.36