City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2a01:598:8000::/33'
% Abuse contact for '2a01:598:8000::/33' is 'abuse@telekom.de'
inet6num: 2a01:598:8000::/33
assignment-size:64
netname: Customer-v6-0001
country: DE
admin-c: AS8728-RIPE
tech-c: MS47198-RIPE
status: AGGREGATED-BY-LIR
remarks: ***************************************************************************
remarks: Please send any abuse complaints to: abuse@telekom.de
remarks: Behoerdenauskuenfte koennen nur ueber folgende Ruf- bzw. Faxnummern beantwortet werden:
remarks: Fax: 0180-18811-66 (0,039 Euro/Minute aus dem Festnetz der Deutschen Telekom AG.)
remarks: Tel.: 0180-18811-77 (0,039 Euro/Minute aus dem Festnetz der Deutschen Telekom AG.)
remarks: ***************************************************************************
mnt-by: MNT-TMD
created: 2018-10-04T07:12:50Z
last-modified: 2019-01-24T09:22:11Z
source: RIPE
person: Alexander Schloesser
address: Telekom Deutschland GmbH
address: Landgrabenweg 149
address: D-53227 Bonn
address: Germany
phone: +49 228 181 0
mnt-by: MNT-TMD
nic-hdl: AS8728-RIPE
created: 2005-08-09T11:13:06Z
last-modified: 2025-03-10T08:28:56Z
source: RIPE # Filtered
person: Mirko Sitte
address: Telekom Deutschland GmbH
address: Landgrabenweg 149
address: D-53227 Bonn
address: Germany
phone: +49 228 936 0
nic-hdl: MS47198-RIPE
mnt-by: MNT-TMD
created: 2002-07-08T07:23:50Z
last-modified: 2025-03-10T08:29:48Z
source: RIPE # Filtered
% Information related to '2a01:598:8000::/33AS44178'
route6: 2a01:598:8000::/33
descr: Telekom Deutschland GmbH
origin: AS44178
mnt-by: MNT-TMD
created: 2012-08-10T10:49:01Z
last-modified: 2012-08-10T10:49:01Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a01:598:90a4:57ef:719e:878e:35d1:adfb
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 9977
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a01:598:90a4:57ef:719e:878e:35d1:adfb. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sun Mar 22 04:16:28 CST 2026
;; MSG SIZE rcvd: 67
'
Host b.f.d.a.1.d.5.3.e.8.7.8.e.9.1.7.f.e.7.5.4.a.0.9.8.9.5.0.1.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find b.f.d.a.1.d.5.3.e.8.7.8.e.9.1.7.f.e.7.5.4.a.0.9.8.9.5.0.1.0.a.2.ip6.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.207.91.146 | attackbotsspam | [Sun Mar 15 08:41:13 2020] - Syn Flood From IP: 111.207.91.146 Port: 6000 |
2020-03-23 22:12:50 |
| 79.152.165.196 | attackspam | Automatic report - Port Scan Attack |
2020-03-23 21:26:35 |
| 46.105.100.224 | attackspambots | GET /wp-login.php |
2020-03-23 21:51:49 |
| 125.160.112.149 | attackbots | Unauthorized connection attempt from IP address 125.160.112.149 on Port 445(SMB) |
2020-03-23 21:42:48 |
| 149.202.56.194 | attackbotsspam | Invalid user lu from 149.202.56.194 port 47082 |
2020-03-23 21:46:16 |
| 45.124.146.195 | attackbots | Invalid user slime from 45.124.146.195 port 38056 |
2020-03-23 21:26:51 |
| 94.25.176.182 | attackspam | Unauthorized connection attempt from IP address 94.25.176.182 on Port 445(SMB) |
2020-03-23 22:08:40 |
| 119.193.106.80 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-23 21:29:46 |
| 139.198.4.44 | attackspambots | Invalid user joe from 139.198.4.44 port 33320 |
2020-03-23 21:47:33 |
| 178.136.235.119 | attackspambots | web-1 [ssh] SSH Attack |
2020-03-23 22:12:18 |
| 104.251.236.185 | attackspam | 03/23/2020-02:33:43.268343 104.251.236.185 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-03-23 22:13:09 |
| 165.227.67.64 | attackbots | Invalid user karika from 165.227.67.64 port 43324 |
2020-03-23 21:59:52 |
| 36.90.238.214 | attack | Unauthorized connection attempt detected from IP address 36.90.238.214 to port 445 |
2020-03-23 22:00:58 |
| 110.49.103.98 | attack | Unauthorized connection attempt from IP address 110.49.103.98 on Port 445(SMB) |
2020-03-23 21:48:03 |
| 185.164.138.21 | attackspambots | Mar 23 13:45:25 roki sshd[22030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.138.21 user=nobody Mar 23 13:45:27 roki sshd[22030]: Failed password for nobody from 185.164.138.21 port 44718 ssh2 Mar 23 13:53:11 roki sshd[22612]: Invalid user mhlee from 185.164.138.21 Mar 23 13:53:11 roki sshd[22612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.138.21 Mar 23 13:53:14 roki sshd[22612]: Failed password for invalid user mhlee from 185.164.138.21 port 37306 ssh2 ... |
2020-03-23 22:01:27 |