Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Schwebheim

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '46.142.64.0 - 46.142.191.255'

% Abuse contact for '46.142.64.0 - 46.142.191.255' is 'abuse@1und1.net'

inetnum:        46.142.64.0 - 46.142.191.255
netname:        VT-DYNAMICPOOL
org:            ORG-KG4-RIPE
country:        DE
admin-c:        VTH-RIPE
tech-c:         VTH-RIPE
remarks:        Please contact abuse@versatel.de in case of abuse
status:         ASSIGNED PA
mnt-by:         VT-ENGI-MNT
mnt-lower:      VT-GARBAGE-MNT
mnt-domains:    VT-DOMAIN-MNT
created:        2018-10-15T12:15:07Z
last-modified:  2018-10-15T12:15:07Z
source:         RIPE

organisation:   ORG-KG4-RIPE
org-name:       1&1 Versatel GmbH
country:        DE
org-type:       LIR
address:        Wanheimer Strae 90
address:        40468
address:        Duesseldorf
address:        GERMANY
phone:          +49201 8633 145
admin-c:        SP15435-RIPE
admin-c:        OS1997-RIPE
admin-c:        VTH-RIPE
admin-c:        HS7606-RIPE
admin-c:        TK1586-RIPE
admin-c:        BS4675-RIPE
admin-c:        FF9999-RIPE
admin-c:        MD26813-RIPE
abuse-c:        VTH-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        VT-ENGI-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         VT-ENGI-MNT
created:        2004-04-17T11:09:29Z
last-modified:  2025-10-30T11:25:47Z
source:         RIPE # Filtered

role:           Versatel Hostmaster
remarks:        Internet Engineering
address:        1&1 Versatel GmbH
address:        Wanheimer Strae 90
address:        40468 Duesseldorf
address:        Germany
phone:          +49 (0) 211 52283-100
abuse-mailbox:  abuse@1und1.net
admin-c:        OS1997-RIPE
admin-c:        TK1586-RIPE
admin-c:        BS4675-RIPE
admin-c:        FF9999-RIPE
admin-c:        SP15435-RIPE
admin-c:        MD26813-RIPE
tech-c:         BS4675-RIPE
tech-c:         TK1586-RIPE
tech-c:         FF9999-RIPE
tech-c:         SP15435-RIPE
tech-c:         MD26813-RIPE
nic-hdl:        VTH-RIPE
mnt-by:         VT-ENGI-MNT
created:        2004-05-19T12:48:36Z
last-modified:  2026-01-07T11:49:44Z
source:         RIPE # Filtered

% Information related to '46.142.64.0/19AS8881'

route:          46.142.64.0/19
origin:         AS8881
descr:          VT-POOL Customer Sued
mnt-by:         VT-MNT
created:        2022-10-26T20:32:20Z
last-modified:  2022-10-26T20:32:20Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.142.93.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.142.93.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 13:03:19 CST 2026
;; MSG SIZE  rcvd: 106
Host info
221.93.142.46.in-addr.arpa domain name pointer 221-93-142-46.pool.kielnet.net.
Nslookup info:
b'221.93.142.46.in-addr.arpa	name = 221-93-142-46.pool.kielnet.net.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
132.232.113.102 attackbotsspam
Mar 22 06:05:04 silence02 sshd[20900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.113.102
Mar 22 06:05:06 silence02 sshd[20900]: Failed password for invalid user test03 from 132.232.113.102 port 46526 ssh2
Mar 22 06:09:58 silence02 sshd[21158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.113.102
2020-03-22 17:59:57
137.74.193.225 attack
SSH login attempts @ 2020-03-07 13:31:47
2020-03-22 17:27:20
124.156.121.169 attackspam
Mar 22 10:48:41 plex sshd[16023]: Invalid user quincy from 124.156.121.169 port 57184
Mar 22 10:48:41 plex sshd[16023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.169
Mar 22 10:48:41 plex sshd[16023]: Invalid user quincy from 124.156.121.169 port 57184
Mar 22 10:48:43 plex sshd[16023]: Failed password for invalid user quincy from 124.156.121.169 port 57184 ssh2
Mar 22 10:51:42 plex sshd[16128]: Invalid user mori from 124.156.121.169 port 37576
2020-03-22 18:00:26
106.12.27.107 attack
Invalid user oracle from 106.12.27.107 port 33610
2020-03-22 18:11:24
14.143.250.218 attack
14.143.250.218 - - [22/Mar/2020:08:01:16 +0100] "GET /wp-login.php HTTP/1.1" 200 6363 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.143.250.218 - - [22/Mar/2020:08:01:17 +0100] "POST /wp-login.php HTTP/1.1" 200 7262 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.143.250.218 - - [22/Mar/2020:08:01:21 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-22 17:54:07
54.38.190.48 attack
(sshd) Failed SSH login from 54.38.190.48 (FR/France/48.ip-54-38-190.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 22 10:30:28 amsweb01 sshd[11289]: Invalid user ap from 54.38.190.48 port 55328
Mar 22 10:30:30 amsweb01 sshd[11289]: Failed password for invalid user ap from 54.38.190.48 port 55328 ssh2
Mar 22 10:38:11 amsweb01 sshd[12381]: Invalid user acme from 54.38.190.48 port 53202
Mar 22 10:38:13 amsweb01 sshd[12381]: Failed password for invalid user acme from 54.38.190.48 port 53202 ssh2
Mar 22 10:40:20 amsweb01 sshd[12664]: Invalid user fisnet from 54.38.190.48 port 33842
2020-03-22 18:07:09
121.122.51.65 attackbotsspam
Mar 22 11:02:39 ift sshd\[37258\]: Invalid user work from 121.122.51.65Mar 22 11:02:41 ift sshd\[37258\]: Failed password for invalid user work from 121.122.51.65 port 41910 ssh2Mar 22 11:06:10 ift sshd\[37910\]: Invalid user hz from 121.122.51.65Mar 22 11:06:12 ift sshd\[37910\]: Failed password for invalid user hz from 121.122.51.65 port 47256 ssh2Mar 22 11:07:16 ift sshd\[37951\]: Invalid user sells from 121.122.51.65
...
2020-03-22 18:10:22
118.25.44.66 attackspam
Mar 22 05:46:46 SilenceServices sshd[7553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.44.66
Mar 22 05:46:48 SilenceServices sshd[7553]: Failed password for invalid user er from 118.25.44.66 port 54470 ssh2
Mar 22 05:52:17 SilenceServices sshd[9086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.44.66
2020-03-22 17:53:50
213.59.135.87 attackbots
Mar 22 10:22:37 ift sshd\[30886\]: Invalid user bogdan from 213.59.135.87Mar 22 10:22:40 ift sshd\[30886\]: Failed password for invalid user bogdan from 213.59.135.87 port 39768 ssh2Mar 22 10:25:56 ift sshd\[31470\]: Invalid user in from 213.59.135.87Mar 22 10:25:58 ift sshd\[31470\]: Failed password for invalid user in from 213.59.135.87 port 43841 ssh2Mar 22 10:29:23 ift sshd\[31690\]: Invalid user qv from 213.59.135.87
...
2020-03-22 17:40:53
222.89.41.189 attackbots
Email rejected due to spam filtering
2020-03-22 17:43:08
87.246.7.38 attack
(smtpauth) Failed SMTP AUTH login from 87.246.7.38 (BG/Bulgaria/38.0-255.7.246.87.in-addr.arpa): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-22 08:21:30 login authenticator failed for (G25vxfy) [87.246.7.38]: 535 Incorrect authentication data (set_id=admin@golard.com)
2020-03-22 17:45:42
222.186.15.166 attackspambots
Mar 22 05:34:35 server sshd\[29512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
Mar 22 05:34:36 server sshd\[29509\]: Failed password for root from 222.186.15.166 port 20524 ssh2
Mar 22 05:34:36 server sshd\[29512\]: Failed password for root from 222.186.15.166 port 57496 ssh2
Mar 22 12:26:05 server sshd\[24794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
Mar 22 12:26:08 server sshd\[24794\]: Failed password for root from 222.186.15.166 port 10479 ssh2
...
2020-03-22 17:30:25
66.70.130.155 attackspam
SSH login attempts.
2020-03-22 17:36:22
18.221.245.101 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-03-22 18:00:45
111.231.66.74 attackbotsspam
$f2bV_matches
2020-03-22 17:44:48

Recently Reported IPs

134.122.127.158 210.24.209.214 110.78.158.67 110.77.187.24
2606:4700:10::6816:2351 2606:4700:10::6814:9198 2606:4700:10::6814:7149 2606:4700:10::6814:7979
220.8.199.200 231.100.157.147 211.137.169.36 20.119.235.85
197.234.31.61 192.228.132.91 170.64.134.120 177.43.228.50
162.131.32.42 143.58.223.1 38.60.254.174 220.167.233.234