City: Augsburg
Region: Bayern
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.209.159.0 - 213.209.159.255'
% Abuse contact for '213.209.159.0 - 213.209.159.255' is 'admin@feoprest.life'
inetnum: 213.209.159.0 - 213.209.159.255
netname: FeoPrestSRL
org: ORG-FPS12-RIPE
country: DE
admin-c: FP16819-RIPE
tech-c: FP16819-RIPE
status: SUB-ALLOCATED PA
created: 2025-12-19T19:57:11Z
last-modified: 2025-12-19T21:19:23Z
source: RIPE
mnt-by: FeoPrest-MNT
organisation: ORG-FPS12-RIPE
mnt-ref: wcd
org-name: Feo Prest SRL
org-type: OTHER
address: VALU LUI TRAIAN, Str. PLUGARILOR, Nr. 5A, judet CONSTANTA
country: RO
reg-nr: 19186487
abuse-c: ACRO60442-RIPE
mnt-ref: FeoPrest-MNT
mnt-by: FeoPrest-MNT
created: 2025-05-20T19:33:50Z
last-modified: 2026-05-13T06:03:41Z
source: RIPE # Filtered
role: Feo Prest
address: VALU LUI TRAIAN, Str. PLUGARILOR, Nr. 5A, judet CONSTANTA
nic-hdl: FP16819-RIPE
mnt-by: FeoPrest-MNT
created: 2025-05-20T19:31:57Z
last-modified: 2025-11-22T11:19:13Z
source: RIPE # Filtered
% Information related to '213.209.159.0/24AS208137'
route: 213.209.159.0/24
origin: AS208137
created: 2025-12-19T21:17:25Z
last-modified: 2025-12-19T21:17:25Z
source: RIPE
mnt-by: FeoPrest-MNT
% This query was served by the RIPE Database Query Service version 1.122.1 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.209.159.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.209.159.186. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051600 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 01:00:04 CST 2026
;; MSG SIZE rcvd: 108
Host 186.159.209.213.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 186.159.209.213.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.140.188.54 | attackbots | Honeypot hit. |
2019-12-28 05:43:56 |
| 177.9.48.88 | attack | Unauthorized connection attempt from IP address 177.9.48.88 on Port 445(SMB) |
2019-12-28 05:23:25 |
| 197.156.81.53 | attackbots | Unauthorized connection attempt from IP address 197.156.81.53 on Port 445(SMB) |
2019-12-28 05:43:10 |
| 110.45.244.79 | attack | Unauthorized SSH login attempts |
2019-12-28 05:13:50 |
| 5.133.24.113 | attack | Unauthorized connection attempt from IP address 5.133.24.113 on Port 445(SMB) |
2019-12-28 05:28:08 |
| 3.0.91.111 | attack | familiengesundheitszentrum-fulda.de 3.0.91.111 [27/Dec/2019:16:42:03 +0100] "POST /wp-login.php HTTP/1.1" 200 6330 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" familiengesundheitszentrum-fulda.de 3.0.91.111 [27/Dec/2019:16:42:05 +0100] "POST /wp-login.php HTTP/1.1" 200 6288 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-12-28 05:23:08 |
| 51.83.104.120 | attack | Invalid user finley from 51.83.104.120 port 39238 |
2019-12-28 05:30:19 |
| 159.89.134.199 | attack | Triggered by Fail2Ban at Vostok web server |
2019-12-28 05:25:34 |
| 201.68.127.114 | attackbotsspam | Unauthorized connection attempt from IP address 201.68.127.114 on Port 445(SMB) |
2019-12-28 05:13:07 |
| 104.140.188.6 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2019-12-28 05:34:08 |
| 164.163.146.181 | attack | Unauthorized connection attempt from IP address 164.163.146.181 on Port 445(SMB) |
2019-12-28 05:19:17 |
| 79.17.32.67 | attackbots | Honeypot attack, port: 23, PTR: host67-32-dynamic.17-79-r.retail.telecomitalia.it. |
2019-12-28 05:31:32 |
| 180.242.181.183 | attackbots | 1577472657 - 12/27/2019 19:50:57 Host: 180.242.181.183/180.242.181.183 Port: 445 TCP Blocked |
2019-12-28 05:40:38 |
| 159.65.171.113 | attack | Invalid user damahn from 159.65.171.113 port 45110 |
2019-12-28 05:22:13 |
| 185.209.0.18 | attack | Multiport scan : 19 ports scanned 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3390 3391 3392 3393 3394 3395 3396 3397 3398 |
2019-12-28 05:28:57 |