City: Hamburg
Region: Hamburg
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2001:16b8:6000::/35'
% Abuse contact for '2001:16b8:6000::/35' is 'abuse@1und1.net'
inet6num: 2001:16b8:6000::/35
netname: Customer-BRAS-Nord
country: DE
admin-c: VTH-RIPE
tech-c: VTH-RIPE
status: ASSIGNED
mnt-by: VT-MNT
created: 2021-02-23T08:18:02Z
last-modified: 2021-02-23T08:18:02Z
source: RIPE
role: Versatel Hostmaster
remarks: Internet Engineering
address: 1&1 Versatel GmbH
address: Wanheimer Strae 90
address: 40468 Duesseldorf
address: Germany
phone: +49 (0) 211 52283-100
abuse-mailbox: abuse@1und1.net
admin-c: OS1997-RIPE
admin-c: TK1586-RIPE
admin-c: BS4675-RIPE
admin-c: FF9999-RIPE
admin-c: SP15435-RIPE
admin-c: MD26813-RIPE
tech-c: BS4675-RIPE
tech-c: TK1586-RIPE
tech-c: FF9999-RIPE
tech-c: SP15435-RIPE
tech-c: MD26813-RIPE
nic-hdl: VTH-RIPE
mnt-by: VT-ENGI-MNT
created: 2004-05-19T12:48:36Z
last-modified: 2026-01-07T11:49:44Z
source: RIPE # Filtered
% Information related to '2001:16b8:6000::/35AS8881'
route6: 2001:16b8:6000::/35
descr: VT-Customer North
origin: AS8881
mnt-by: VT-MNT
created: 2023-03-22T11:01:37Z
last-modified: 2023-03-22T11:01:37Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:16b8:605d:d800:7409:17e3:4680:c7cf
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 54361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:16b8:605d:d800:7409:17e3:4680:c7cf. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu Apr 16 03:13:55 CST 2026
;; MSG SIZE rcvd: 68
'
f.c.7.c.0.8.6.4.3.e.7.1.9.0.4.7.0.0.8.d.d.5.0.6.8.b.6.1.1.0.0.2.ip6.arpa domain name pointer 200116b8605dd800740917e34680c7cf.dip.versatel-1u1.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
f.c.7.c.0.8.6.4.3.e.7.1.9.0.4.7.0.0.8.d.d.5.0.6.8.b.6.1.1.0.0.2.ip6.arpa name = 200116b8605dd800740917e34680c7cf.dip.versatel-1u1.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 85.209.0.221 | attackspam | Port probing on unauthorized port 22 |
2020-05-05 02:47:25 |
| 167.172.195.15 | attackbotsspam | Honeypot hit. |
2020-05-05 02:53:12 |
| 123.49.47.26 | attackspambots | IP blocked |
2020-05-05 03:16:21 |
| 203.168.31.117 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-05 03:26:59 |
| 193.31.24.113 | attackbotsspam | 05/04/2020-20:48:31.359779 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic |
2020-05-05 02:53:39 |
| 46.0.203.166 | attackbots | May 4 20:02:10 mail sshd\[18180\]: Invalid user zabbix from 46.0.203.166 May 4 20:02:10 mail sshd\[18180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.0.203.166 May 4 20:02:12 mail sshd\[18180\]: Failed password for invalid user zabbix from 46.0.203.166 port 39770 ssh2 ... |
2020-05-05 03:15:41 |
| 101.227.82.219 | attackbots | no |
2020-05-05 03:28:40 |
| 206.189.191.205 | attackspam | [Mon May 04 13:29:01 2020] - DDoS Attack From IP: 206.189.191.205 Port: 34921 |
2020-05-05 03:27:51 |
| 79.137.82.213 | attackbots | May 5 01:38:15 webhost01 sshd[30311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213 May 5 01:38:17 webhost01 sshd[30311]: Failed password for invalid user iza from 79.137.82.213 port 34322 ssh2 ... |
2020-05-05 03:08:07 |
| 165.227.45.195 | attackbotsspam | May 4 15:12:09 server sshd[51591]: Failed password for invalid user samuel from 165.227.45.195 port 52208 ssh2 May 4 15:19:14 server sshd[57636]: Failed password for invalid user adam from 165.227.45.195 port 55402 ssh2 May 4 15:26:06 server sshd[63080]: Failed password for root from 165.227.45.195 port 58598 ssh2 |
2020-05-05 03:09:56 |
| 106.13.238.73 | attack | 2020-05-04T14:04:15.223112v22018076590370373 sshd[10413]: Failed password for invalid user richard from 106.13.238.73 port 41354 ssh2 2020-05-04T14:08:32.104958v22018076590370373 sshd[18012]: Invalid user user1 from 106.13.238.73 port 57854 2020-05-04T14:08:32.111244v22018076590370373 sshd[18012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.238.73 2020-05-04T14:08:32.104958v22018076590370373 sshd[18012]: Invalid user user1 from 106.13.238.73 port 57854 2020-05-04T14:08:34.005415v22018076590370373 sshd[18012]: Failed password for invalid user user1 from 106.13.238.73 port 57854 ssh2 ... |
2020-05-05 02:56:00 |
| 182.43.134.224 | attackbotsspam | "fail2ban match" |
2020-05-05 03:29:45 |
| 5.88.130.165 | attackbotsspam | Honeypot attack, port: 445, PTR: net-5-88-130-165.cust.vodafonedsl.it. |
2020-05-05 02:58:48 |
| 45.61.3.68 | attack | May 4 19:05:12 ncomp sshd[27231]: Invalid user daniel from 45.61.3.68 May 4 19:05:12 ncomp sshd[27231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.61.3.68 May 4 19:05:12 ncomp sshd[27231]: Invalid user daniel from 45.61.3.68 May 4 19:05:14 ncomp sshd[27231]: Failed password for invalid user daniel from 45.61.3.68 port 37790 ssh2 |
2020-05-05 03:05:36 |
| 206.189.127.6 | attackbots | May 4 19:45:52 vps sshd[674837]: Invalid user ed from 206.189.127.6 port 46504 May 4 19:45:52 vps sshd[674837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.127.6 May 4 19:45:54 vps sshd[674837]: Failed password for invalid user ed from 206.189.127.6 port 46504 ssh2 May 4 19:49:27 vps sshd[689868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.127.6 user=root May 4 19:49:29 vps sshd[689868]: Failed password for root from 206.189.127.6 port 33030 ssh2 ... |
2020-05-05 02:49:50 |