Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lauterbourg

Region: Grand Est

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '194.163.128.0 - 194.163.159.255'

% Abuse contact for '194.163.128.0 - 194.163.159.255' is 'abuse@contabo.de'

inetnum:        194.163.128.0 - 194.163.159.255
netname:        CONTABO
country:        DE
admin-c:        MH7476-RIPE
tech-c:         MH7476-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-CONTABO
created:        2021-04-27T08:52:23Z
last-modified:  2021-04-27T08:52:23Z
source:         RIPE

person:         Johannes Selg
address:        Contabo GmbH
address:        Welfenstr. 22
address:        81541 Mnchen
phone:          +49 89 21268372
fax-no:         +49 89 21665862
nic-hdl:        MH7476-RIPE
mnt-by:         MNT-CONTABO
mnt-by:         MNT-GIGA-HOSTING
created:        2010-01-04T10:41:37Z
last-modified:  2025-12-05T12:12:21Z
source:         RIPE

% Information related to '194.163.128.0/18AS51167'

route:          194.163.128.0/18
origin:         AS51167
mnt-by:         MNT-CONTABO
created:        2021-03-12T09:26:37Z
last-modified:  2021-03-12T09:26:37Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.163.134.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11239
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.163.134.74.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 20 04:30:26 CST 2026
;; MSG SIZE  rcvd: 107
Host info
74.134.163.194.in-addr.arpa domain name pointer vmi3138383.contaboserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.134.163.194.in-addr.arpa	name = vmi3138383.contaboserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.105.121.55 attackbotsspam
Invalid user admin from 185.105.121.55 port 39173
2019-10-24 22:05:46
153.127.93.21 attackspambots
2019-10-24T15:57:02.265360scmdmz1 sshd\[18411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.93.21  user=root
2019-10-24T15:57:04.330684scmdmz1 sshd\[18411\]: Failed password for root from 153.127.93.21 port 56255 ssh2
2019-10-24T15:57:06.580804scmdmz1 sshd\[18422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.93.21  user=root
...
2019-10-24 22:08:02
125.130.110.20 attackspambots
2019-10-24T08:38:32.818443ns525875 sshd\[31011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20  user=root
2019-10-24T08:38:34.949640ns525875 sshd\[31011\]: Failed password for root from 125.130.110.20 port 35684 ssh2
2019-10-24T08:42:46.210345ns525875 sshd\[1534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20  user=root
2019-10-24T08:42:47.879838ns525875 sshd\[1534\]: Failed password for root from 125.130.110.20 port 52526 ssh2
...
2019-10-24 21:47:58
103.210.28.90 attackbots
Invalid user supervisor from 103.210.28.90 port 60081
2019-10-24 22:16:19
41.218.202.150 attackspambots
Invalid user admin from 41.218.202.150 port 51480
2019-10-24 21:59:14
106.13.37.61 attackbotsspam
Invalid user admin from 106.13.37.61 port 45416
2019-10-24 22:15:45
195.214.223.84 attackbots
Invalid user support from 195.214.223.84 port 34832
2019-10-24 22:02:37
182.61.18.254 attackspam
Invalid user beletje from 182.61.18.254 port 52552
2019-10-24 22:06:43
190.211.141.217 attackspam
Oct 24 15:56:20 vps691689 sshd[1909]: Failed password for root from 190.211.141.217 port 18436 ssh2
Oct 24 16:01:45 vps691689 sshd[1992]: Failed password for root from 190.211.141.217 port 59102 ssh2
...
2019-10-24 22:05:27
59.145.221.103 attackspambots
Invalid user admin from 59.145.221.103 port 53381
2019-10-24 21:55:07
51.68.136.168 attackbotsspam
$f2bV_matches
2019-10-24 21:57:11
115.75.2.189 attack
Invalid user ts from 115.75.2.189 port 8554
2019-10-24 22:12:55
195.16.41.171 attack
Invalid user M from 195.16.41.171 port 43026
2019-10-24 22:03:42
52.166.95.124 attack
Invalid user t from 52.166.95.124 port 13556
2019-10-24 21:56:45
216.83.44.102 attackbotsspam
Invalid user wilmar from 216.83.44.102 port 36612
2019-10-24 22:00:57

Recently Reported IPs

2606:4700:10::6816:1146 2606:4700:10::6816:3176 2606:4700:10::6816:852 185.218.138.59
14.212.95.178 221.2.170.239 2606:4700:10::ac43:1077 2606:4700:10::6816:134
2606:4700:10::ac43:1460 2606:4700:10::6816:3273 2606:4700:10::6814:6117 54.211.193.79
54.172.51.23 185.210.154.83 134.35.157.100 2606:4700:10::6814:6315
2606:4700:10::6816:4133 2606:4700:10::6816:442d 18.183.175.177 217.174.231.246