Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Augsburg

Region: Bayern

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '213.209.159.0 - 213.209.159.255'

% Abuse contact for '213.209.159.0 - 213.209.159.255' is 'admin@feoprest.life'

inetnum:        213.209.159.0 - 213.209.159.255
netname:        FeoPrestSRL
org:            ORG-FPS12-RIPE
country:        DE
admin-c:        FP16819-RIPE
tech-c:         FP16819-RIPE
status:         SUB-ALLOCATED PA
created:        2025-12-19T19:57:11Z
last-modified:  2025-12-19T21:19:23Z
source:         RIPE
mnt-by:         FeoPrest-MNT

organisation:   ORG-FPS12-RIPE
mnt-ref:        wcd
org-name:       Feo Prest SRL
org-type:       OTHER
address:        VALU LUI TRAIAN, Str. PLUGARILOR, Nr. 5A, judet CONSTANTA
country:        RO
reg-nr:         19186487
abuse-c:        ACRO60442-RIPE
mnt-ref:        FeoPrest-MNT
mnt-by:         FeoPrest-MNT
created:        2025-05-20T19:33:50Z
last-modified:  2026-05-13T06:03:41Z
source:         RIPE # Filtered

role:           Feo Prest
address:        VALU LUI TRAIAN, Str. PLUGARILOR, Nr. 5A, judet CONSTANTA
nic-hdl:        FP16819-RIPE
mnt-by:         FeoPrest-MNT
created:        2025-05-20T19:31:57Z
last-modified:  2025-11-22T11:19:13Z
source:         RIPE # Filtered

% Information related to '213.209.159.0/24AS208137'

route:          213.209.159.0/24
origin:         AS208137
created:        2025-12-19T21:17:25Z
last-modified:  2025-12-19T21:17:25Z
source:         RIPE
mnt-by:         FeoPrest-MNT

% This query was served by the RIPE Database Query Service version 1.122.1 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.209.159.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.209.159.186.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051600 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 01:00:04 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 186.159.209.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 186.159.209.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.140.188.54 attackbots
Honeypot hit.
2019-12-28 05:43:56
177.9.48.88 attack
Unauthorized connection attempt from IP address 177.9.48.88 on Port 445(SMB)
2019-12-28 05:23:25
197.156.81.53 attackbots
Unauthorized connection attempt from IP address 197.156.81.53 on Port 445(SMB)
2019-12-28 05:43:10
110.45.244.79 attack
Unauthorized SSH login attempts
2019-12-28 05:13:50
5.133.24.113 attack
Unauthorized connection attempt from IP address 5.133.24.113 on Port 445(SMB)
2019-12-28 05:28:08
3.0.91.111 attack
familiengesundheitszentrum-fulda.de 3.0.91.111 [27/Dec/2019:16:42:03 +0100] "POST /wp-login.php HTTP/1.1" 200 6330 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
familiengesundheitszentrum-fulda.de 3.0.91.111 [27/Dec/2019:16:42:05 +0100] "POST /wp-login.php HTTP/1.1" 200 6288 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-28 05:23:08
51.83.104.120 attack
Invalid user finley from 51.83.104.120 port 39238
2019-12-28 05:30:19
159.89.134.199 attack
Triggered by Fail2Ban at Vostok web server
2019-12-28 05:25:34
201.68.127.114 attackbotsspam
Unauthorized connection attempt from IP address 201.68.127.114 on Port 445(SMB)
2019-12-28 05:13:07
104.140.188.6 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-12-28 05:34:08
164.163.146.181 attack
Unauthorized connection attempt from IP address 164.163.146.181 on Port 445(SMB)
2019-12-28 05:19:17
79.17.32.67 attackbots
Honeypot attack, port: 23, PTR: host67-32-dynamic.17-79-r.retail.telecomitalia.it.
2019-12-28 05:31:32
180.242.181.183 attackbots
1577472657 - 12/27/2019 19:50:57 Host: 180.242.181.183/180.242.181.183 Port: 445 TCP Blocked
2019-12-28 05:40:38
159.65.171.113 attack
Invalid user damahn from 159.65.171.113 port 45110
2019-12-28 05:22:13
185.209.0.18 attack
Multiport scan : 19 ports scanned 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3390 3391 3392 3393 3394 3395 3396 3397 3398
2019-12-28 05:28:57

Recently Reported IPs

150.66.91.8 103.99.196.1 219.165.30.217 103.183.113.57
43.134.111.142 135.237.127.68 2606:4700:10::6814:8126 2606:4700:10::6816:1685
2606:4700:10::6816:3518 50.110.126.89 152.10.43.187 121.95.149.95
2606:4700:10::6816:593 111.252.120.5 10.30.121.238 178.238.224.28
85.199.87.142 35.201.217.81 38.12.35.206 2606:4700:10::6814:5021