City: Salzgitter
Region: Niedersachsen
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2003::/19'
% Abuse contact for '2003::/19' is 'abuse@telekom.de'
inet6num: 2003::/19
netname: DE-TELEKOM-20050113
country: DE
geofeed: https://lg.telekom.com/rfc8805/as3320.csv
org: ORG-DTA2-RIPE
admin-c: DTAG-RIPE
tech-c: DTAG-RIPE
status: ALLOCATED-BY-RIR
mnt-by: RIPE-NCC-HM-MNT
mnt-by: DTAG-NIC
mnt-lower: DTAG-NIC
mnt-routes: DTAG-NIC
mnt-routes: DTAG-RR
mnt-domains: DTAG-NIC
mnt-domains: DTAG-RR
created: 2007-07-18T11:48:53Z
last-modified: 2026-03-23T09:15:25Z
source: RIPE # Filtered
organisation: ORG-DTA2-RIPE
org-name: Deutsche Telekom AG
country: DE
reg-nr: District court Bonn HRB 6794
org-type: LIR
address: Eduard-Schopf-Allee 1
address: D-28217
address: Bremen
address: GERMANY
phone: +4942151554041
phone: +4942151555165
fax-no: +494412344589
fax-no: +49391580100379
admin-c: DTAG-RIPE
admin-c: SL7866-RIPE
admin-c: EH4097-RIPE
admin-c: SB15220-RIPE
abuse-c: DTAG3-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: DTAG-NIC
mnt-by: RIPE-NCC-HM-MNT
mnt-by: DTAG-NIC
created: 2004-04-17T11:12:44Z
last-modified: 2026-05-13T07:30:45Z
source: RIPE # Filtered
role: Deutsche Telekom LIR Role Account
address: Deutsche Telekom AG
address: Internet Services
address: Eduard-Schopf-Allee 1
address: DE 28217 Bremen
address: Germany
phone: +49 421 5155 4041
fax-no: +49 441 234 4589
admin-c: SB15220-RIPE
admin-c: DTAG1-RIPE
tech-c: SB15220-RIPE
tech-c: SL7866-RIPE
tech-c: EH4097-RIPE
nic-hdl: DTAG-RIPE
mnt-by: DTAG-NIC
created: 2002-06-11T08:18:56Z
last-modified: 2022-06-22T12:19:08Z
source: RIPE # Filtered
% Information related to '2003::/23AS3320'
route6: 2003::/23
descr: DTAG European region optimized
origin: AS3320
member-of: AS3320:RS-PA-TELEKOM-REGIONALS
mnt-by: DTAG-RR
created: 2014-02-20T18:06:20Z
last-modified: 2014-02-20T18:06:20Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2003:d6:a729:7200:81d8:b8be:f73d:9c8a
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 21352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2003:d6:a729:7200:81d8:b8be:f73d:9c8a. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed May 13 17:41:34 CST 2026
;; MSG SIZE rcvd: 66
'
a.8.c.9.d.3.7.f.e.b.8.b.8.d.1.8.0.0.2.7.9.2.7.a.6.d.0.0.3.0.0.2.ip6.arpa domain name pointer p200300d6a729720081d8b8bef73d9c8a.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
a.8.c.9.d.3.7.f.e.b.8.b.8.d.1.8.0.0.2.7.9.2.7.a.6.d.0.0.3.0.0.2.ip6.arpa name = p200300d6a729720081d8b8bef73d9c8a.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.139.21.75 | attackbotsspam | 2020-02-15T05:56:28.305055vps773228.ovh.net sshd[21596]: Invalid user sun from 37.139.21.75 port 53272 2020-02-15T05:56:28.332341vps773228.ovh.net sshd[21596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75 2020-02-15T05:56:28.305055vps773228.ovh.net sshd[21596]: Invalid user sun from 37.139.21.75 port 53272 2020-02-15T05:56:30.309022vps773228.ovh.net sshd[21596]: Failed password for invalid user sun from 37.139.21.75 port 53272 ssh2 2020-02-15T05:58:16.283623vps773228.ovh.net sshd[21602]: Invalid user 123 from 37.139.21.75 port 39032 2020-02-15T05:58:16.307144vps773228.ovh.net sshd[21602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75 2020-02-15T05:58:16.283623vps773228.ovh.net sshd[21602]: Invalid user 123 from 37.139.21.75 port 39032 2020-02-15T05:58:18.443890vps773228.ovh.net sshd[21602]: Failed password for invalid user 123 from 37.139.21.75 port 39032 ssh2 2020-02-15T06:00 ... |
2020-02-15 18:15:39 |
| 111.248.83.120 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 18:21:25 |
| 111.246.40.150 | attackspam | unauthorized connection attempt |
2020-02-15 18:53:12 |
| 111.248.57.28 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 18:27:40 |
| 118.89.25.35 | attackbots | Brute force SMTP login attempted. ... |
2020-02-15 18:21:01 |
| 185.86.164.98 | attackbotsspam | brute force on admin |
2020-02-15 18:38:43 |
| 117.198.98.191 | attackspam | Feb 15 13:32:35 server sshd\[10675\]: Invalid user sshopenvpn from 117.198.98.191 Feb 15 13:32:35 server sshd\[10675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.198.98.191 Feb 15 13:32:37 server sshd\[10675\]: Failed password for invalid user sshopenvpn from 117.198.98.191 port 38302 ssh2 Feb 15 13:35:09 server sshd\[11184\]: Invalid user backuppc from 117.198.98.191 Feb 15 13:35:10 server sshd\[11184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.198.98.191 ... |
2020-02-15 18:40:38 |
| 122.51.179.14 | attackbots | Feb 15 03:56:51 firewall sshd[16861]: Invalid user upload@123 from 122.51.179.14 Feb 15 03:56:53 firewall sshd[16861]: Failed password for invalid user upload@123 from 122.51.179.14 port 33192 ssh2 Feb 15 04:01:35 firewall sshd[17150]: Invalid user wdjl@2015 from 122.51.179.14 ... |
2020-02-15 18:32:51 |
| 198.23.192.74 | attackspam | [2020-02-15 05:23:27] NOTICE[1148][C-000095df] chan_sip.c: Call from '' (198.23.192.74:61780) to extension '0004146213724610' rejected because extension not found in context 'public'. [2020-02-15 05:23:27] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T05:23:27.331-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0004146213724610",SessionID="0x7fd82c80d368",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/198.23.192.74/61780",ACLName="no_extension_match" [2020-02-15 05:28:08] NOTICE[1148][C-000095e7] chan_sip.c: Call from '' (198.23.192.74:51079) to extension '0009146213724610' rejected because extension not found in context 'public'. [2020-02-15 05:28:08] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T05:28:08.886-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0009146213724610",SessionID="0x7fd82c80d368",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/ ... |
2020-02-15 18:28:40 |
| 160.238.75.249 | attackbots | 20/2/15@01:55:36: FAIL: Alarm-Network address from=160.238.75.249 ... |
2020-02-15 18:58:27 |
| 45.143.220.4 | attackspambots | [2020-02-15 00:17:33] NOTICE[1148][C-000094b3] chan_sip.c: Call from '' (45.143.220.4:29613) to extension '1650390237920793' rejected because extension not found in context 'public'. [2020-02-15 00:17:33] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T00:17:33.246-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1650390237920793",SessionID="0x7fd82c7af4d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.4/5060",ACLName="no_extension_match" [2020-02-15 00:21:45] NOTICE[1148][C-000094ba] chan_sip.c: Call from '' (45.143.220.4:24514) to extension '1450390237920793' rejected because extension not found in context 'public'. [2020-02-15 00:21:45] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T00:21:45.337-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1450390237920793",SessionID="0x7fd82cd36058",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/ ... |
2020-02-15 18:40:12 |
| 200.37.200.157 | attackspambots | unauthorized connection attempt |
2020-02-15 18:46:30 |
| 111.248.84.243 | attack | unauthorized connection attempt |
2020-02-15 18:18:02 |
| 85.243.128.8 | attackspambots | Feb 15 06:40:23 ws24vmsma01 sshd[168340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.243.128.8 Feb 15 06:40:25 ws24vmsma01 sshd[168340]: Failed password for invalid user daichuqu from 85.243.128.8 port 38980 ssh2 ... |
2020-02-15 18:26:33 |
| 111.248.63.177 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 18:23:02 |