Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Salzburg

Region: Salzburg

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '217.149.160.0 - 217.149.167.255'

% Abuse contact for '217.149.160.0 - 217.149.167.255' is 'abuse@a1.at'

inetnum:        217.149.160.0 - 217.149.167.255
netname:        A1TA-HSI
descr:          High Speed Internet Customers
descr:          A1 Telekom Austria AG
country:        AT
admin-c:        HMH25-RIPE
tech-c:         AAH12-RIPE
tech-c:         DAH12-RIPE
tech-c:         HMH25-RIPE
status:         ASSIGNED PA
remarks:        please contact abuse @ a1telekom.at for criminal use, portscan, SPAM, etc.
mnt-by:         AS8447-MNT
created:        2016-06-07T10:05:43Z
last-modified:  2016-06-07T10:05:43Z
source:         RIPE

role:           Abuse Admin Highway
address:        A1 Telekom Austria AG
address:        Postfach 1001
address:        1011 Wien
address:        Austria
phone:          +43 50664 0
fax-no:         +43 50664 49210
abuse-mailbox:  abuse@a1.at
admin-c:        SD5741-RIPE
tech-c:         SD5741-RIPE
nic-hdl:        AAH12-RIPE
remarks:        **************************************************
remarks:        * CONTACT FOR CRIMINAL USE, PORTSCAN, SPAM, ETC. *
remarks:        **************************************************
mnt-by:         AS8447-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2018-05-23T10:09:13Z
source:         RIPE # Filtered

role:           Domain Admin Highway
address:        A1 Telekom Austria AG
address:        Arsenal Objekt 24
address:        1030 Wien
address:        Austria
phone:          +43 50664 0
fax-no:         +43 50664 44414
abuse-mailbox:  abuse@a1.at
admin-c:        WC82-RIPE
tech-c:         CW6434-RIPE
tech-c:         WC82-RIPE
nic-hdl:        DAH12-RIPE
mnt-by:         AS8447-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2018-05-23T10:24:35Z
source:         RIPE # Filtered

role:           Host Master Highway
address:        A1 Telekom Austria AG
address:        Arsenal Objekt 24
address:        1030 Vienna
address:        Austria
phone:          +43 50 664 8 664 100
fax-no:         +43 50 664 8 664 101
abuse-mailbox:  abuse@a1.at
remarks:        for database maintenance please contact
remarks:        < hostmaster @ aon.at >
admin-c:        AJ2061-RIPE
tech-c:         AJ2061-RIPE
nic-hdl:        HMH25-RIPE
mnt-by:         AS8447-MNT
created:        2002-05-31T10:41:49Z
last-modified:  2026-01-26T08:40:49Z
source:         RIPE # Filtered

% Information related to '217.149.160.0/20AS8447'

route:          217.149.160.0/20
descr:          A1 Telekom Austria AG
origin:         AS8447
org:            ORG-TAA1-RIPE
mnt-by:         AS8447-MNT
created:        2023-05-03T10:26:44Z
last-modified:  2023-05-03T10:26:44Z
source:         RIPE

organisation:   ORG-TAA1-RIPE
org-name:       A1 Telekom Austria AG
country:        AT
org-type:       LIR
address:        Lassallestrasse 9
address:        1020
address:        Wien
address:        AUSTRIA
phone:          +43 50 664 8 664 100
fax-no:         +43 50 664 8 664 101
descr:          ======================================================================
descr:          www.a1.net
descr:          Abuse issues abuse@A1.at
descr:          Operational issues noc@aon.at
descr:          Peering requests peering@aon.at
descr:          Looking glass https://ppp.a1.net/tools/lookingglass.sp
descr:          Other info https://as8447.peeringdb.com
descr:          ======================================================================
admin-c:        NCH12-RIPE
admin-c:        HMH25-RIPE
admin-c:        AJ2061-RIPE
abuse-c:        HMH25-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        AS8447-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         AS8447-MNT
created:        2004-04-17T10:59:34Z
last-modified:  2026-01-26T08:45:18Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.1 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.149.163.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.149.163.193.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031701 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 03:59:01 CST 2026
;; MSG SIZE  rcvd: 108
Host info
193.163.149.217.in-addr.arpa domain name pointer 217-149-163-193.nat.highway.telekom.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.163.149.217.in-addr.arpa	name = 217-149-163-193.nat.highway.telekom.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
87.251.74.62 attack
Fail2Ban Ban Triggered
2020-05-10 15:25:35
185.176.27.26 attack
Port scan on 3 port(s): 11110 20001 20002
2020-05-10 15:19:17
64.15.129.124 attackspam
Bad Request [like port scan]

[09/May/2020:07:37:41 +0900] 400 64.15.129.116 "\x15\x03\x01\x00\x02\x01\x00" "-" "-"
[09/May/2020:07:37:43 +0900] 400 64.15.129.124 "\x15\x03\x02\x00\x02\x01\x00" "-" "-"
[09/May/2020:07:37:48 +0900] 400 70.38.27.252 "\x15\x03\x03\x00\x02\x01\x00" "-" "-"
2020-05-10 15:04:47
104.131.71.105 attack
ssh brute force
2020-05-10 15:37:32
148.72.31.119 attack
WordPress login Brute force / Web App Attack on client site.
2020-05-10 15:11:39
222.186.30.112 attackspam
10.05.2020 07:03:46 SSH access blocked by firewall
2020-05-10 15:04:17
176.31.182.125 attack
May 10 01:13:27 NPSTNNYC01T sshd[29133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125
May 10 01:13:29 NPSTNNYC01T sshd[29133]: Failed password for invalid user jhonny from 176.31.182.125 port 57611 ssh2
May 10 01:16:23 NPSTNNYC01T sshd[29449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125
...
2020-05-10 15:18:19
182.61.108.39 attackspambots
May 10 07:26:11 ns381471 sshd[1731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.39
May 10 07:26:12 ns381471 sshd[1731]: Failed password for invalid user user from 182.61.108.39 port 60584 ssh2
2020-05-10 15:17:35
162.243.10.64 attackbotsspam
May 10 08:20:39 h2829583 sshd[22346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64
2020-05-10 15:19:47
94.102.51.16 attackbotsspam
Port scan on 3 port(s): 62028 62177 62200
2020-05-10 15:01:43
140.246.155.37 attack
May 10 07:48:36 home sshd[5917]: Failed password for root from 140.246.155.37 port 33566 ssh2
May 10 07:53:40 home sshd[6641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.155.37
May 10 07:53:42 home sshd[6641]: Failed password for invalid user admin from 140.246.155.37 port 34319 ssh2
...
2020-05-10 15:21:22
37.187.16.30 attack
May 10 10:42:44 gw1 sshd[14878]: Failed password for ubuntu from 37.187.16.30 port 43438 ssh2
May 10 10:49:09 gw1 sshd[15112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.16.30
...
2020-05-10 15:20:05
106.12.207.236 attackspam
SSH brutforce
2020-05-10 15:44:35
138.68.75.113 attackbots
$f2bV_matches
2020-05-10 15:47:38
142.93.195.15 attack
Invalid user test from 142.93.195.15 port 41684
2020-05-10 15:42:28

Recently Reported IPs

45.76.202.157 45.76.202.124 68.183.206.32 74.249.178.114
35.241.166.201 188.166.178.184 139.59.116.9 221.241.183.80
217.104.210.219 216.27.114.30 212.161.91.208 207.54.113.238
54.205.241.255 54.163.179.109 13.218.68.64 44.236.88.213
178.128.214.41 13.218.97.192 36.142.78.49 14.212.94.38