Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Deggendorf

Region: Bayern

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2003:ca:af05:f30:105b:b3a5:4a0c:9260
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 64465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2003:ca:af05:f30:105b:b3a5:4a0c:9260. IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Sep 20 01:43:30 CST 2025
;; MSG SIZE  rcvd: 65

'
Host info
0.6.2.9.c.0.a.4.5.a.3.b.b.5.0.1.0.3.f.0.5.0.f.a.a.c.0.0.3.0.0.2.ip6.arpa domain name pointer p200300caaf050f30105bb3a54a0c9260.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
0.6.2.9.c.0.a.4.5.a.3.b.b.5.0.1.0.3.f.0.5.0.f.a.a.c.0.0.3.0.0.2.ip6.arpa	name = p200300caaf050f30105bb3a54a0c9260.dip0.t-ipconnect.de.

Authoritative answers can be found from:

Related comments:
IP Type Details Datetime
124.105.198.108 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-28 18:36:30
107.170.57.221 attackbots
Feb 28 09:51:24 gw1 sshd[28719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.57.221
Feb 28 09:51:25 gw1 sshd[28719]: Failed password for invalid user postgres from 107.170.57.221 port 36685 ssh2
...
2020-02-28 18:27:26
111.93.178.122 attack
Honeypot attack, port: 445, PTR: static-122.178.93.111-tataidc.co.in.
2020-02-28 18:42:24
2.180.118.13 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-28 18:19:00
117.244.41.164 attackspam
Feb 28 04:51:30 ms-srv sshd[2813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.244.41.164
Feb 28 04:51:32 ms-srv sshd[2813]: Failed password for invalid user admin from 117.244.41.164 port 41682 ssh2
2020-02-28 18:22:26
157.245.98.160 attackbots
Feb 28 10:19:02 sso sshd[22749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.98.160
Feb 28 10:19:04 sso sshd[22749]: Failed password for invalid user staff from 157.245.98.160 port 58986 ssh2
...
2020-02-28 18:11:56
67.205.153.74 attackspam
Automatic report - Banned IP Access
2020-02-28 18:35:05
201.249.167.250 attackspambots
1582865479 - 02/28/2020 05:51:19 Host: 201.249.167.250/201.249.167.250 Port: 445 TCP Blocked
2020-02-28 18:30:10
129.226.118.77 attackbots
Feb 28 05:45:54 server sshd[2964066]: Failed password for root from 129.226.118.77 port 36382 ssh2
Feb 28 05:49:09 server sshd[2964814]: Failed password for invalid user gitlab-runner from 129.226.118.77 port 38788 ssh2
Feb 28 05:51:07 server sshd[2965266]: Failed password for invalid user david from 129.226.118.77 port 57926 ssh2
2020-02-28 18:41:23
8.14.149.127 attackbots
Feb 28 10:47:22 MK-Soft-VM3 sshd[10229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.14.149.127 
Feb 28 10:47:25 MK-Soft-VM3 sshd[10229]: Failed password for invalid user yang from 8.14.149.127 port 15033 ssh2
...
2020-02-28 18:18:39
149.129.222.252 attackspambots
DATE:2020-02-28 09:53:15, IP:149.129.222.252, PORT:ssh SSH brute force auth (docker-dc)
2020-02-28 18:13:22
88.157.229.59 attack
Feb 28 09:26:45 vps691689 sshd[16819]: Failed password for root from 88.157.229.59 port 59006 ssh2
Feb 28 09:34:17 vps691689 sshd[16931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.157.229.59
...
2020-02-28 18:15:04
192.241.201.182 attackbots
Feb 28 05:21:45 plusreed sshd[17565]: Invalid user invite from 192.241.201.182
...
2020-02-28 18:22:41
198.23.189.18 attackbotsspam
*Port Scan* detected from 198.23.189.18 (US/United States/198-23-189-18-host.colocrossing.com). 4 hits in the last 140 seconds
2020-02-28 18:39:27
80.81.110.50 attackspam
20/2/27@23:51:23: FAIL: Alarm-Network address from=80.81.110.50
...
2020-02-28 18:28:05

Recently Reported IPs

173.212.238.133 69.164.223.209 64.62.156.142 187.189.87.96
18.158.232.199 160.202.35.24 3.92.197.210 54.242.109.237
34.66.73.92 185.255.91.107 165.154.125.226 94.156.152.44
132.255.211.243 92.3.81.183 64.62.156.27 211.75.210.20
35.203.211.123 162.216.150.228 2001:0:2851:b9f0:188a:895b:20a4:c46b 182.44.2.148