Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Salzgitter

Region: Niedersachsen

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '2003::/19'

% Abuse contact for '2003::/19' is 'abuse@telekom.de'

inet6num:       2003::/19
netname:        DE-TELEKOM-20050113
country:        DE
geofeed:        https://lg.telekom.com/rfc8805/as3320.csv
org:            ORG-DTA2-RIPE
admin-c:        DTAG-RIPE
tech-c:         DTAG-RIPE
status:         ALLOCATED-BY-RIR
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         DTAG-NIC
mnt-lower:      DTAG-NIC
mnt-routes:     DTAG-NIC
mnt-routes:     DTAG-RR
mnt-domains:    DTAG-NIC
mnt-domains:    DTAG-RR
created:        2007-07-18T11:48:53Z
last-modified:  2026-03-23T09:15:25Z
source:         RIPE # Filtered

organisation:   ORG-DTA2-RIPE
org-name:       Deutsche Telekom AG
country:        DE
reg-nr:         District court Bonn HRB 6794
org-type:       LIR
address:        Eduard-Schopf-Allee 1
address:        D-28217
address:        Bremen
address:        GERMANY
phone:          +4942151554041
phone:          +4942151555165
fax-no:         +494412344589
fax-no:         +49391580100379
admin-c:        DTAG-RIPE
admin-c:        SL7866-RIPE
admin-c:        EH4097-RIPE
admin-c:        SB15220-RIPE
abuse-c:        DTAG3-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        DTAG-NIC
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         DTAG-NIC
created:        2004-04-17T11:12:44Z
last-modified:  2026-05-13T07:30:45Z
source:         RIPE # Filtered

role:           Deutsche Telekom LIR Role Account
address:        Deutsche Telekom AG
address:        Internet Services
address:        Eduard-Schopf-Allee 1
address:        DE 28217 Bremen
address:        Germany
phone:          +49 421 5155 4041
fax-no:         +49 441 234 4589
admin-c:        SB15220-RIPE
admin-c:        DTAG1-RIPE
tech-c:         SB15220-RIPE
tech-c:         SL7866-RIPE
tech-c:         EH4097-RIPE
nic-hdl:        DTAG-RIPE
mnt-by:         DTAG-NIC
created:        2002-06-11T08:18:56Z
last-modified:  2022-06-22T12:19:08Z
source:         RIPE # Filtered

% Information related to '2003::/23AS3320'

route6:         2003::/23
descr:          DTAG European region optimized
origin:         AS3320
member-of:      AS3320:RS-PA-TELEKOM-REGIONALS
mnt-by:         DTAG-RR
created:        2014-02-20T18:06:20Z
last-modified:  2014-02-20T18:06:20Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2003:d6:a729:7200:81d8:b8be:f73d:9c8a
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 21352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2003:d6:a729:7200:81d8:b8be:f73d:9c8a. IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed May 13 17:41:34 CST 2026
;; MSG SIZE  rcvd: 66

'
Host info
a.8.c.9.d.3.7.f.e.b.8.b.8.d.1.8.0.0.2.7.9.2.7.a.6.d.0.0.3.0.0.2.ip6.arpa domain name pointer p200300d6a729720081d8b8bef73d9c8a.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
a.8.c.9.d.3.7.f.e.b.8.b.8.d.1.8.0.0.2.7.9.2.7.a.6.d.0.0.3.0.0.2.ip6.arpa	name = p200300d6a729720081d8b8bef73d9c8a.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related comments:
IP Type Details Datetime
37.139.21.75 attackbotsspam
2020-02-15T05:56:28.305055vps773228.ovh.net sshd[21596]: Invalid user sun from 37.139.21.75 port 53272
2020-02-15T05:56:28.332341vps773228.ovh.net sshd[21596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75
2020-02-15T05:56:28.305055vps773228.ovh.net sshd[21596]: Invalid user sun from 37.139.21.75 port 53272
2020-02-15T05:56:30.309022vps773228.ovh.net sshd[21596]: Failed password for invalid user sun from 37.139.21.75 port 53272 ssh2
2020-02-15T05:58:16.283623vps773228.ovh.net sshd[21602]: Invalid user 123 from 37.139.21.75 port 39032
2020-02-15T05:58:16.307144vps773228.ovh.net sshd[21602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75
2020-02-15T05:58:16.283623vps773228.ovh.net sshd[21602]: Invalid user 123 from 37.139.21.75 port 39032
2020-02-15T05:58:18.443890vps773228.ovh.net sshd[21602]: Failed password for invalid user 123 from 37.139.21.75 port 39032 ssh2
2020-02-15T06:00
...
2020-02-15 18:15:39
111.248.83.120 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 18:21:25
111.246.40.150 attackspam
unauthorized connection attempt
2020-02-15 18:53:12
111.248.57.28 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 18:27:40
118.89.25.35 attackbots
Brute force SMTP login attempted.
...
2020-02-15 18:21:01
185.86.164.98 attackbotsspam
brute force on admin
2020-02-15 18:38:43
117.198.98.191 attackspam
Feb 15 13:32:35 server sshd\[10675\]: Invalid user sshopenvpn from 117.198.98.191
Feb 15 13:32:35 server sshd\[10675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.198.98.191 
Feb 15 13:32:37 server sshd\[10675\]: Failed password for invalid user sshopenvpn from 117.198.98.191 port 38302 ssh2
Feb 15 13:35:09 server sshd\[11184\]: Invalid user backuppc from 117.198.98.191
Feb 15 13:35:10 server sshd\[11184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.198.98.191 
...
2020-02-15 18:40:38
122.51.179.14 attackbots
Feb 15 03:56:51 firewall sshd[16861]: Invalid user upload@123 from 122.51.179.14
Feb 15 03:56:53 firewall sshd[16861]: Failed password for invalid user upload@123 from 122.51.179.14 port 33192 ssh2
Feb 15 04:01:35 firewall sshd[17150]: Invalid user wdjl@2015 from 122.51.179.14
...
2020-02-15 18:32:51
198.23.192.74 attackspam
[2020-02-15 05:23:27] NOTICE[1148][C-000095df] chan_sip.c: Call from '' (198.23.192.74:61780) to extension '0004146213724610' rejected because extension not found in context 'public'.
[2020-02-15 05:23:27] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T05:23:27.331-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0004146213724610",SessionID="0x7fd82c80d368",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/198.23.192.74/61780",ACLName="no_extension_match"
[2020-02-15 05:28:08] NOTICE[1148][C-000095e7] chan_sip.c: Call from '' (198.23.192.74:51079) to extension '0009146213724610' rejected because extension not found in context 'public'.
[2020-02-15 05:28:08] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T05:28:08.886-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0009146213724610",SessionID="0x7fd82c80d368",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/
...
2020-02-15 18:28:40
160.238.75.249 attackbots
20/2/15@01:55:36: FAIL: Alarm-Network address from=160.238.75.249
...
2020-02-15 18:58:27
45.143.220.4 attackspambots
[2020-02-15 00:17:33] NOTICE[1148][C-000094b3] chan_sip.c: Call from '' (45.143.220.4:29613) to extension '1650390237920793' rejected because extension not found in context 'public'.
[2020-02-15 00:17:33] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T00:17:33.246-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1650390237920793",SessionID="0x7fd82c7af4d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.4/5060",ACLName="no_extension_match"
[2020-02-15 00:21:45] NOTICE[1148][C-000094ba] chan_sip.c: Call from '' (45.143.220.4:24514) to extension '1450390237920793' rejected because extension not found in context 'public'.
[2020-02-15 00:21:45] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-15T00:21:45.337-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1450390237920793",SessionID="0x7fd82cd36058",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-02-15 18:40:12
200.37.200.157 attackspambots
unauthorized connection attempt
2020-02-15 18:46:30
111.248.84.243 attack
unauthorized connection attempt
2020-02-15 18:18:02
85.243.128.8 attackspambots
Feb 15 06:40:23 ws24vmsma01 sshd[168340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.243.128.8
Feb 15 06:40:25 ws24vmsma01 sshd[168340]: Failed password for invalid user daichuqu from 85.243.128.8 port 38980 ssh2
...
2020-02-15 18:26:33
111.248.63.177 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 18:23:02

Recently Reported IPs

20.168.6.41 31.169.82.68 57.141.16.97 35.208.217.108
202.144.137.94 110.78.153.121 2606:4700:10::6814:5318 2606:4700:10::6816:4140
20.221.68.74 10.223.24.110 119.28.100.147 134.35.157.43
2606:4700:10::6814:8420 99.10.76.25 34.85.82.221 35.187.220.208
43.156.18.240 2606:4700:10::6814:6575 69.189.152.90 204.0.23.7