City: Schwebheim
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '46.142.64.0 - 46.142.191.255'
% Abuse contact for '46.142.64.0 - 46.142.191.255' is 'abuse@1und1.net'
inetnum: 46.142.64.0 - 46.142.191.255
netname: VT-DYNAMICPOOL
org: ORG-KG4-RIPE
country: DE
admin-c: VTH-RIPE
tech-c: VTH-RIPE
remarks: Please contact abuse@versatel.de in case of abuse
status: ASSIGNED PA
mnt-by: VT-ENGI-MNT
mnt-lower: VT-GARBAGE-MNT
mnt-domains: VT-DOMAIN-MNT
created: 2018-10-15T12:15:07Z
last-modified: 2018-10-15T12:15:07Z
source: RIPE
organisation: ORG-KG4-RIPE
org-name: 1&1 Versatel GmbH
country: DE
org-type: LIR
address: Wanheimer Strae 90
address: 40468
address: Duesseldorf
address: GERMANY
phone: +49201 8633 145
admin-c: SP15435-RIPE
admin-c: OS1997-RIPE
admin-c: VTH-RIPE
admin-c: HS7606-RIPE
admin-c: TK1586-RIPE
admin-c: BS4675-RIPE
admin-c: FF9999-RIPE
admin-c: MD26813-RIPE
abuse-c: VTH-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: VT-ENGI-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: VT-ENGI-MNT
created: 2004-04-17T11:09:29Z
last-modified: 2025-10-30T11:25:47Z
source: RIPE # Filtered
role: Versatel Hostmaster
remarks: Internet Engineering
address: 1&1 Versatel GmbH
address: Wanheimer Strae 90
address: 40468 Duesseldorf
address: Germany
phone: +49 (0) 211 52283-100
abuse-mailbox: abuse@1und1.net
admin-c: OS1997-RIPE
admin-c: TK1586-RIPE
admin-c: BS4675-RIPE
admin-c: FF9999-RIPE
admin-c: SP15435-RIPE
admin-c: MD26813-RIPE
tech-c: BS4675-RIPE
tech-c: TK1586-RIPE
tech-c: FF9999-RIPE
tech-c: SP15435-RIPE
tech-c: MD26813-RIPE
nic-hdl: VTH-RIPE
mnt-by: VT-ENGI-MNT
created: 2004-05-19T12:48:36Z
last-modified: 2026-01-07T11:49:44Z
source: RIPE # Filtered
% Information related to '46.142.64.0/19AS8881'
route: 46.142.64.0/19
origin: AS8881
descr: VT-POOL Customer Sued
mnt-by: VT-MNT
created: 2022-10-26T20:32:20Z
last-modified: 2022-10-26T20:32:20Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.142.93.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.142.93.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 13:03:19 CST 2026
;; MSG SIZE rcvd: 106
221.93.142.46.in-addr.arpa domain name pointer 221-93-142-46.pool.kielnet.net.
b'221.93.142.46.in-addr.arpa name = 221-93-142-46.pool.kielnet.net.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 132.232.113.102 | attackbotsspam | Mar 22 06:05:04 silence02 sshd[20900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.113.102 Mar 22 06:05:06 silence02 sshd[20900]: Failed password for invalid user test03 from 132.232.113.102 port 46526 ssh2 Mar 22 06:09:58 silence02 sshd[21158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.113.102 |
2020-03-22 17:59:57 |
| 137.74.193.225 | attack | SSH login attempts @ 2020-03-07 13:31:47 |
2020-03-22 17:27:20 |
| 124.156.121.169 | attackspam | Mar 22 10:48:41 plex sshd[16023]: Invalid user quincy from 124.156.121.169 port 57184 Mar 22 10:48:41 plex sshd[16023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.169 Mar 22 10:48:41 plex sshd[16023]: Invalid user quincy from 124.156.121.169 port 57184 Mar 22 10:48:43 plex sshd[16023]: Failed password for invalid user quincy from 124.156.121.169 port 57184 ssh2 Mar 22 10:51:42 plex sshd[16128]: Invalid user mori from 124.156.121.169 port 37576 |
2020-03-22 18:00:26 |
| 106.12.27.107 | attack | Invalid user oracle from 106.12.27.107 port 33610 |
2020-03-22 18:11:24 |
| 14.143.250.218 | attack | 14.143.250.218 - - [22/Mar/2020:08:01:16 +0100] "GET /wp-login.php HTTP/1.1" 200 6363 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 14.143.250.218 - - [22/Mar/2020:08:01:17 +0100] "POST /wp-login.php HTTP/1.1" 200 7262 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 14.143.250.218 - - [22/Mar/2020:08:01:21 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-03-22 17:54:07 |
| 54.38.190.48 | attack | (sshd) Failed SSH login from 54.38.190.48 (FR/France/48.ip-54-38-190.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 22 10:30:28 amsweb01 sshd[11289]: Invalid user ap from 54.38.190.48 port 55328 Mar 22 10:30:30 amsweb01 sshd[11289]: Failed password for invalid user ap from 54.38.190.48 port 55328 ssh2 Mar 22 10:38:11 amsweb01 sshd[12381]: Invalid user acme from 54.38.190.48 port 53202 Mar 22 10:38:13 amsweb01 sshd[12381]: Failed password for invalid user acme from 54.38.190.48 port 53202 ssh2 Mar 22 10:40:20 amsweb01 sshd[12664]: Invalid user fisnet from 54.38.190.48 port 33842 |
2020-03-22 18:07:09 |
| 121.122.51.65 | attackbotsspam | Mar 22 11:02:39 ift sshd\[37258\]: Invalid user work from 121.122.51.65Mar 22 11:02:41 ift sshd\[37258\]: Failed password for invalid user work from 121.122.51.65 port 41910 ssh2Mar 22 11:06:10 ift sshd\[37910\]: Invalid user hz from 121.122.51.65Mar 22 11:06:12 ift sshd\[37910\]: Failed password for invalid user hz from 121.122.51.65 port 47256 ssh2Mar 22 11:07:16 ift sshd\[37951\]: Invalid user sells from 121.122.51.65 ... |
2020-03-22 18:10:22 |
| 118.25.44.66 | attackspam | Mar 22 05:46:46 SilenceServices sshd[7553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.44.66 Mar 22 05:46:48 SilenceServices sshd[7553]: Failed password for invalid user er from 118.25.44.66 port 54470 ssh2 Mar 22 05:52:17 SilenceServices sshd[9086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.44.66 |
2020-03-22 17:53:50 |
| 213.59.135.87 | attackbots | Mar 22 10:22:37 ift sshd\[30886\]: Invalid user bogdan from 213.59.135.87Mar 22 10:22:40 ift sshd\[30886\]: Failed password for invalid user bogdan from 213.59.135.87 port 39768 ssh2Mar 22 10:25:56 ift sshd\[31470\]: Invalid user in from 213.59.135.87Mar 22 10:25:58 ift sshd\[31470\]: Failed password for invalid user in from 213.59.135.87 port 43841 ssh2Mar 22 10:29:23 ift sshd\[31690\]: Invalid user qv from 213.59.135.87 ... |
2020-03-22 17:40:53 |
| 222.89.41.189 | attackbots | Email rejected due to spam filtering |
2020-03-22 17:43:08 |
| 87.246.7.38 | attack | (smtpauth) Failed SMTP AUTH login from 87.246.7.38 (BG/Bulgaria/38.0-255.7.246.87.in-addr.arpa): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-22 08:21:30 login authenticator failed for (G25vxfy) [87.246.7.38]: 535 Incorrect authentication data (set_id=admin@golard.com) |
2020-03-22 17:45:42 |
| 222.186.15.166 | attackspambots | Mar 22 05:34:35 server sshd\[29512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root Mar 22 05:34:36 server sshd\[29509\]: Failed password for root from 222.186.15.166 port 20524 ssh2 Mar 22 05:34:36 server sshd\[29512\]: Failed password for root from 222.186.15.166 port 57496 ssh2 Mar 22 12:26:05 server sshd\[24794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root Mar 22 12:26:08 server sshd\[24794\]: Failed password for root from 222.186.15.166 port 10479 ssh2 ... |
2020-03-22 17:30:25 |
| 66.70.130.155 | attackspam | SSH login attempts. |
2020-03-22 17:36:22 |
| 18.221.245.101 | attackbotsspam | CMS (WordPress or Joomla) login attempt. |
2020-03-22 18:00:45 |
| 111.231.66.74 | attackbotsspam | $f2bV_matches |
2020-03-22 17:44:48 |