Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '213.147.176.0 - 213.147.191.255'

% Abuse contact for '213.147.176.0 - 213.147.191.255' is 'abuse@a1.at'

inetnum:        213.147.176.0 - 213.147.191.255
netname:        A1TA-HSI
descr:          High Speed Internet Customers
descr:          A1 Telekom Austria AG
country:        AT
admin-c:        HMH25-RIPE
tech-c:         AAH12-RIPE
tech-c:         DAH12-RIPE
tech-c:         HMH25-RIPE
status:         ASSIGNED PA
remarks:        please contact abuse @ a1telekom.at for criminal use, portscan, SPAM, etc.
mnt-by:         AS8447-MNT
created:        2016-11-14T12:31:40Z
last-modified:  2016-11-14T12:31:40Z
source:         RIPE

role:           Abuse Admin Highway
address:        A1 Telekom Austria AG
address:        Postfach 1001
address:        1011 Wien
address:        Austria
phone:          +43 50664 0
fax-no:         +43 50664 49210
abuse-mailbox:  abuse@a1.at
admin-c:        SD5741-RIPE
tech-c:         SD5741-RIPE
nic-hdl:        AAH12-RIPE
remarks:        **************************************************
remarks:        * CONTACT FOR CRIMINAL USE, PORTSCAN, SPAM, ETC. *
remarks:        **************************************************
mnt-by:         AS8447-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2018-05-23T10:09:13Z
source:         RIPE # Filtered

role:           Domain Admin Highway
address:        A1 Telekom Austria AG
address:        Arsenal Objekt 24
address:        1030 Wien
address:        Austria
phone:          +43 50664 0
fax-no:         +43 50664 44414
abuse-mailbox:  abuse@a1.at
admin-c:        WC82-RIPE
tech-c:         CW6434-RIPE
tech-c:         WC82-RIPE
nic-hdl:        DAH12-RIPE
mnt-by:         AS8447-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2018-05-23T10:24:35Z
source:         RIPE # Filtered

role:           Host Master Highway
address:        A1 Telekom Austria AG
address:        Arsenal Objekt 24
address:        1030 Vienna
address:        Austria
phone:          +43 50 664 8 664 100
fax-no:         +43 50 664 8 664 101
abuse-mailbox:  abuse@a1.at
remarks:        for database maintenance please contact
remarks:        < hostmaster @ aon.at >
admin-c:        AJ2061-RIPE
tech-c:         AJ2061-RIPE
nic-hdl:        HMH25-RIPE
mnt-by:         AS8447-MNT
created:        2002-05-31T10:41:49Z
last-modified:  2026-01-26T08:40:49Z
source:         RIPE # Filtered

% Information related to '213.147.160.0/19AS8447'

route:          213.147.160.0/19
descr:          A1 Telekom Austria AG
origin:         AS8447
org:            ORG-TAA1-RIPE
mnt-by:         AS8447-MNT
created:        2023-05-03T10:26:44Z
last-modified:  2023-05-03T10:26:44Z
source:         RIPE

organisation:   ORG-TAA1-RIPE
org-name:       A1 Telekom Austria AG
country:        AT
org-type:       LIR
address:        Lassallestrasse 9
address:        1020
address:        Wien
address:        AUSTRIA
phone:          +43 50 664 8 664 100
fax-no:         +43 50 664 8 664 101
descr:          ======================================================================
descr:          www.a1.net
descr:          Abuse issues abuse@A1.at
descr:          Operational issues noc@aon.at
descr:          Peering requests peering@aon.at
descr:          Looking glass https://ppp.a1.net/tools/lookingglass.sp
descr:          Other info https://as8447.peeringdb.com
descr:          ======================================================================
admin-c:        NCH12-RIPE
admin-c:        HMH25-RIPE
admin-c:        AJ2061-RIPE
abuse-c:        HMH25-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        AS8447-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         AS8447-MNT
created:        2004-04-17T10:59:34Z
last-modified:  2026-01-26T08:45:18Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.147.185.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.147.185.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 10:24:51 CST 2026
;; MSG SIZE  rcvd: 107
Host info
13.185.147.213.in-addr.arpa domain name pointer 213-147-185-13.hdsl.highway.telekom.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.185.147.213.in-addr.arpa	name = 213-147-185-13.hdsl.highway.telekom.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.20.98.1 attack
Unauthorized connection attempt from IP address 113.20.98.1 on Port 445(SMB)
2020-03-23 21:34:56
112.42.81.208 attackspambots
5555/tcp
[2020-03-23]1pkt
2020-03-23 21:32:31
92.63.194.238 attackspam
A portscan was detected. Details about the event:
Source IP address: 92.63.194.238
2020-03-23 21:33:05
203.202.249.214 attackspambots
Unauthorized connection attempt from IP address 203.202.249.214 on Port 445(SMB)
2020-03-23 21:05:20
175.136.212.186 attackbotsspam
SSH Brute Force
2020-03-23 21:16:05
5.255.253.25 attackbots
[Mon Mar 23 18:44:10.449303 2020] [:error] [pid 10526:tid 139645939312384] [client 5.255.253.25:44367] [client 5.255.253.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XnihCgUkPLKnP9@8s07hFwAAAtA"]
...
2020-03-23 21:45:43
5.135.198.62 attack
Mar 23 12:05:02 Invalid user office from 5.135.198.62 port 55545
2020-03-23 21:18:36
113.161.1.111 attackbotsspam
detected by Fail2Ban
2020-03-23 21:24:06
122.252.239.5 attackbots
DATE:2020-03-23 14:18:45, IP:122.252.239.5, PORT:ssh SSH brute force auth (docker-dc)
2020-03-23 21:34:30
45.124.146.195 attackbots
Invalid user slime from 45.124.146.195 port 38056
2020-03-23 21:26:51
8.14.149.127 attackspam
Mar 23 13:21:50 ourumov-web sshd\[14323\]: Invalid user app-dev from 8.14.149.127 port 33826
Mar 23 13:21:50 ourumov-web sshd\[14323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.14.149.127
Mar 23 13:21:53 ourumov-web sshd\[14323\]: Failed password for invalid user app-dev from 8.14.149.127 port 33826 ssh2
...
2020-03-23 21:35:38
123.207.153.52 attack
Mar 23 13:17:58 amit sshd\[13310\]: Invalid user speech-dispatcher from 123.207.153.52
Mar 23 13:17:58 amit sshd\[13310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.153.52
Mar 23 13:18:00 amit sshd\[13310\]: Failed password for invalid user speech-dispatcher from 123.207.153.52 port 38124 ssh2
...
2020-03-23 21:10:56
108.50.246.206 attack
[Thu Mar 19 08:45:02 2020] - Syn Flood From IP: 108.50.246.206 Port: 51596
2020-03-23 21:38:54
177.182.228.59 attackspam
Honeypot attack, port: 5555, PTR: b1b6e43b.virtua.com.br.
2020-03-23 21:12:50
222.89.236.175 attackbots
Helo
2020-03-23 21:30:01

Recently Reported IPs

209.9.203.45 8.134.102.38 35.203.211.195 157.230.94.223
148.181.212.168 2606:4700:10::6816:720 2606:4700:10::6816:203 2606:4700:10::6816:4450
2606:4700:10::6816:3539 85.217.140.5 61.247.230.105 121.237.149.165
2606:4700:10::ac43:1556 110.78.158.109 2606:4700:10::6816:3681 2606:4700:10::6816:1976
2606:4700:10::6816:3558 2606:4700:10::6814:4834 2606:4700:10::ac43:59e 2606:4700:10::ac43:1991