City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.147.176.0 - 213.147.191.255'
% Abuse contact for '213.147.176.0 - 213.147.191.255' is 'abuse@a1.at'
inetnum: 213.147.176.0 - 213.147.191.255
netname: A1TA-HSI
descr: High Speed Internet Customers
descr: A1 Telekom Austria AG
country: AT
admin-c: HMH25-RIPE
tech-c: AAH12-RIPE
tech-c: DAH12-RIPE
tech-c: HMH25-RIPE
status: ASSIGNED PA
remarks: please contact abuse @ a1telekom.at for criminal use, portscan, SPAM, etc.
mnt-by: AS8447-MNT
created: 2016-11-14T12:31:40Z
last-modified: 2016-11-14T12:31:40Z
source: RIPE
role: Abuse Admin Highway
address: A1 Telekom Austria AG
address: Postfach 1001
address: 1011 Wien
address: Austria
phone: +43 50664 0
fax-no: +43 50664 49210
abuse-mailbox: abuse@a1.at
admin-c: SD5741-RIPE
tech-c: SD5741-RIPE
nic-hdl: AAH12-RIPE
remarks: **************************************************
remarks: * CONTACT FOR CRIMINAL USE, PORTSCAN, SPAM, ETC. *
remarks: **************************************************
mnt-by: AS8447-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2018-05-23T10:09:13Z
source: RIPE # Filtered
role: Domain Admin Highway
address: A1 Telekom Austria AG
address: Arsenal Objekt 24
address: 1030 Wien
address: Austria
phone: +43 50664 0
fax-no: +43 50664 44414
abuse-mailbox: abuse@a1.at
admin-c: WC82-RIPE
tech-c: CW6434-RIPE
tech-c: WC82-RIPE
nic-hdl: DAH12-RIPE
mnt-by: AS8447-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2018-05-23T10:24:35Z
source: RIPE # Filtered
role: Host Master Highway
address: A1 Telekom Austria AG
address: Arsenal Objekt 24
address: 1030 Vienna
address: Austria
phone: +43 50 664 8 664 100
fax-no: +43 50 664 8 664 101
abuse-mailbox: abuse@a1.at
remarks: for database maintenance please contact
remarks: < hostmaster @ aon.at >
admin-c: AJ2061-RIPE
tech-c: AJ2061-RIPE
nic-hdl: HMH25-RIPE
mnt-by: AS8447-MNT
created: 2002-05-31T10:41:49Z
last-modified: 2026-01-26T08:40:49Z
source: RIPE # Filtered
% Information related to '213.147.160.0/19AS8447'
route: 213.147.160.0/19
descr: A1 Telekom Austria AG
origin: AS8447
org: ORG-TAA1-RIPE
mnt-by: AS8447-MNT
created: 2023-05-03T10:26:44Z
last-modified: 2023-05-03T10:26:44Z
source: RIPE
organisation: ORG-TAA1-RIPE
org-name: A1 Telekom Austria AG
country: AT
org-type: LIR
address: Lassallestrasse 9
address: 1020
address: Wien
address: AUSTRIA
phone: +43 50 664 8 664 100
fax-no: +43 50 664 8 664 101
descr: ======================================================================
descr: www.a1.net
descr: Abuse issues abuse@A1.at
descr: Operational issues noc@aon.at
descr: Peering requests peering@aon.at
descr: Looking glass https://ppp.a1.net/tools/lookingglass.sp
descr: Other info https://as8447.peeringdb.com
descr: ======================================================================
admin-c: NCH12-RIPE
admin-c: HMH25-RIPE
admin-c: AJ2061-RIPE
abuse-c: HMH25-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: AS8447-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS8447-MNT
created: 2004-04-17T10:59:34Z
last-modified: 2026-01-26T08:45:18Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.147.185.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.147.185.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 10:24:51 CST 2026
;; MSG SIZE rcvd: 107
13.185.147.213.in-addr.arpa domain name pointer 213-147-185-13.hdsl.highway.telekom.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.185.147.213.in-addr.arpa name = 213-147-185-13.hdsl.highway.telekom.at.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.20.98.1 | attack | Unauthorized connection attempt from IP address 113.20.98.1 on Port 445(SMB) |
2020-03-23 21:34:56 |
| 112.42.81.208 | attackspambots | 5555/tcp [2020-03-23]1pkt |
2020-03-23 21:32:31 |
| 92.63.194.238 | attackspam | A portscan was detected. Details about the event: Source IP address: 92.63.194.238 |
2020-03-23 21:33:05 |
| 203.202.249.214 | attackspambots | Unauthorized connection attempt from IP address 203.202.249.214 on Port 445(SMB) |
2020-03-23 21:05:20 |
| 175.136.212.186 | attackbotsspam | SSH Brute Force |
2020-03-23 21:16:05 |
| 5.255.253.25 | attackbots | [Mon Mar 23 18:44:10.449303 2020] [:error] [pid 10526:tid 139645939312384] [client 5.255.253.25:44367] [client 5.255.253.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XnihCgUkPLKnP9@8s07hFwAAAtA"] ... |
2020-03-23 21:45:43 |
| 5.135.198.62 | attack | Mar 23 12:05:02 Invalid user office from 5.135.198.62 port 55545 |
2020-03-23 21:18:36 |
| 113.161.1.111 | attackbotsspam | detected by Fail2Ban |
2020-03-23 21:24:06 |
| 122.252.239.5 | attackbots | DATE:2020-03-23 14:18:45, IP:122.252.239.5, PORT:ssh SSH brute force auth (docker-dc) |
2020-03-23 21:34:30 |
| 45.124.146.195 | attackbots | Invalid user slime from 45.124.146.195 port 38056 |
2020-03-23 21:26:51 |
| 8.14.149.127 | attackspam | Mar 23 13:21:50 ourumov-web sshd\[14323\]: Invalid user app-dev from 8.14.149.127 port 33826 Mar 23 13:21:50 ourumov-web sshd\[14323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.14.149.127 Mar 23 13:21:53 ourumov-web sshd\[14323\]: Failed password for invalid user app-dev from 8.14.149.127 port 33826 ssh2 ... |
2020-03-23 21:35:38 |
| 123.207.153.52 | attack | Mar 23 13:17:58 amit sshd\[13310\]: Invalid user speech-dispatcher from 123.207.153.52 Mar 23 13:17:58 amit sshd\[13310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.153.52 Mar 23 13:18:00 amit sshd\[13310\]: Failed password for invalid user speech-dispatcher from 123.207.153.52 port 38124 ssh2 ... |
2020-03-23 21:10:56 |
| 108.50.246.206 | attack | [Thu Mar 19 08:45:02 2020] - Syn Flood From IP: 108.50.246.206 Port: 51596 |
2020-03-23 21:38:54 |
| 177.182.228.59 | attackspam | Honeypot attack, port: 5555, PTR: b1b6e43b.virtua.com.br. |
2020-03-23 21:12:50 |
| 222.89.236.175 | attackbots | Helo |
2020-03-23 21:30:01 |