City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '78.132.0.0 - 78.132.63.255'
% Abuse contact for '78.132.0.0 - 78.132.63.255' is 'abuse@magenta.at'
inetnum: 78.132.0.0 - 78.132.63.255
netname: TMA_GPRSINTERNET
descr: T-Mobile Austria GmbH
country: AT
admin-c: TMA5-RIPE
tech-c: TMA5-RIPE
status: ASSIGNED PA
mnt-by: AS8412-MNT
org: ORG-MTSG1-RIPE
created: 2007-08-29T09:01:45Z
last-modified: 2007-08-29T09:01:45Z
source: RIPE # Filtered
organisation: ORG-MTSG1-RIPE
org-name: T-Mobile Austria GmbH
country: AT
org-type: LIR
address: Rennweg 97-99
address: A-1030
address: Wien
address: AUSTRIA
phone: +43 1 795 85 7239
admin-c: TMA5-RIPE
mnt-ref: AS8412-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS8412-MNT
abuse-c: TMA5-RIPE
created: 2004-04-17T10:59:05Z
last-modified: 2025-08-05T09:18:22Z
source: RIPE # Filtered
role: Magenta Telekom
address: T-Mobile Austria GmbH
address: Rennweg 97-99
address: A-1030 Vienna
address: Austria
mnt-by: AS8412-MNT
abuse-mailbox: abuse@magenta.at
org: ORG-MTSG1-RIPE
admin-c: TH2844-RIPE
admin-c: KRK9-RIPE
admin-c: CS552-RIPE
admin-c: DK1765-RIPE
admin-c: WIGG1-RIPE
tech-c: TH2844-RIPE
tech-c: KRK9-RIPE
tech-c: CS552-RIPE
tech-c: DK1765-RIPE
tech-c: WIGG1-RIPE
nic-hdl: TMA5-RIPE
created: 2006-08-02T10:45:55Z
last-modified: 2023-09-18T18:08:37Z
source: RIPE # Filtered
% Information related to '78.132.0.0/18AS8412'
route: 78.132.0.0/18
descr: Magenta Telekom
origin: AS8412
mnt-by: AS8412-MNT
created: 2021-07-05T17:42:28Z
last-modified: 2021-07-05T17:42:28Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.132.5.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;78.132.5.119. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 09:09:09 CST 2026
;; MSG SIZE rcvd: 105
119.5.132.78.in-addr.arpa domain name pointer 078132005119.public.t-mobile.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
119.5.132.78.in-addr.arpa name = 078132005119.public.t-mobile.at.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.221.60.145 | attackspambots | Automatic report - Banned IP Access |
2020-02-08 18:29:19 |
| 123.193.80.144 | attack | Honeypot attack, port: 5555, PTR: 123-193-80-144.dynamic.kbronet.com.tw. |
2020-02-08 17:55:22 |
| 184.22.82.147 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-02-08 18:32:13 |
| 93.157.158.220 | attackbots | Honeypot attack, port: 5555, PTR: 93.157.158.220.hispeed.pl. |
2020-02-08 18:11:22 |
| 112.133.236.118 | attackspam | SMB Server BruteForce Attack |
2020-02-08 18:18:53 |
| 178.188.179.58 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-08 18:18:33 |
| 5.189.239.188 | attack | Port 48800 scan denied |
2020-02-08 18:33:53 |
| 122.51.246.89 | attackbotsspam | Feb 8 06:54:39 MK-Soft-Root2 sshd[4411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.246.89 Feb 8 06:54:41 MK-Soft-Root2 sshd[4411]: Failed password for invalid user eyz from 122.51.246.89 port 40536 ssh2 ... |
2020-02-08 17:56:25 |
| 157.46.75.145 | attack | 1581137524 - 02/08/2020 05:52:04 Host: 157.46.75.145/157.46.75.145 Port: 445 TCP Blocked |
2020-02-08 18:38:29 |
| 185.51.201.244 | attack | IR_MNT-SHAHRAD_<177>1581137585 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 185.51.201.244:43930 |
2020-02-08 17:54:31 |
| 5.135.101.228 | attack | Feb 8 07:03:29 vps46666688 sshd[7050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.101.228 Feb 8 07:03:31 vps46666688 sshd[7050]: Failed password for invalid user sxc from 5.135.101.228 port 38124 ssh2 ... |
2020-02-08 18:17:15 |
| 112.95.249.136 | attackspambots | Feb 8 09:05:41 mout sshd[15788]: Invalid user ffo from 112.95.249.136 port 3270 |
2020-02-08 18:13:46 |
| 165.22.38.221 | attack | Feb 8 11:16:52 silence02 sshd[23579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.38.221 Feb 8 11:16:54 silence02 sshd[23579]: Failed password for invalid user foz from 165.22.38.221 port 51214 ssh2 Feb 8 11:19:45 silence02 sshd[23761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.38.221 |
2020-02-08 18:32:44 |
| 112.85.42.176 | attackbots | SSH_scan |
2020-02-08 18:05:21 |
| 91.121.179.189 | attackspam | Port 11001 scan denied |
2020-02-08 18:13:28 |