City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '85.215.216.0 - 85.215.223.255'
% Abuse contact for '85.215.216.0 - 85.215.223.255' is 'abuse@strato.de'
inetnum: 85.215.216.0 - 85.215.223.255
netname: de-ber-ionos-cloud-txl
descr: IONOS SE
country: DE
admin-c: IPAD-RIPE
tech-c: IPOP-RIPE
status: ASSIGNED PA
mnt-by: AS8560-MNT
created: 2024-11-21T17:03:30Z
last-modified: 2025-06-03T16:17:36Z
source: RIPE
role: IP Administration
address: IONOS SE
admin-c: SH15342-RIPE
tech-c: SH15342-RIPE
mnt-ref: AS8560-MNT
nic-hdl: IPAD-RIPE
abuse-mailbox: abuse@ionos.com
mnt-by: AS8560-MNT
created: 2009-05-20T17:24:09Z
last-modified: 2025-09-26T12:26:46Z
source: RIPE # Filtered
role: IP Operations
address: IONOS SE
admin-c: SH15342-RIPE
tech-c: SH15342-RIPE
mnt-ref: AS8560-MNT
nic-hdl: IPOP-RIPE
abuse-mailbox: abuse@ionos.com
mnt-by: AS8560-MNT
created: 2009-05-28T16:25:04Z
last-modified: 2025-09-26T12:26:44Z
source: RIPE # Filtered
% Information related to '85.215.128.0/17AS8560'
route: 85.215.128.0/17
descr: IONOS SE ber.de
origin: AS8560
mnt-by: AS8560-MNT
created: 2024-02-01T10:20:15Z
last-modified: 2024-02-01T10:20:15Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.215.219.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.215.219.126. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042700 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 23:30:35 CST 2026
;; MSG SIZE rcvd: 107
126.219.215.85.in-addr.arpa domain name pointer ip85-215-219-126.pbiaas.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
126.219.215.85.in-addr.arpa name = ip85-215-219-126.pbiaas.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 67.6.254.157 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-09-04 15:41:44 |
| 122.144.134.27 | attack | Sep 4 01:26:55 django-0 sshd[14042]: Invalid user matias from 122.144.134.27 ... |
2020-09-04 15:35:21 |
| 183.2.102.19 | attackspambots | Lines containing failures of 183.2.102.19 Sep 2 04:40:06 newdogma sshd[28433]: Invalid user csvn from 183.2.102.19 port 40690 Sep 2 04:40:06 newdogma sshd[28433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.2.102.19 Sep 2 04:40:08 newdogma sshd[28433]: Failed password for invalid user csvn from 183.2.102.19 port 40690 ssh2 Sep 2 04:40:10 newdogma sshd[28433]: Received disconnect from 183.2.102.19 port 40690:11: Bye Bye [preauth] Sep 2 04:40:10 newdogma sshd[28433]: Disconnected from invalid user csvn 183.2.102.19 port 40690 [preauth] Sep 2 04:45:26 newdogma sshd[29511]: Invalid user michael from 183.2.102.19 port 37776 Sep 2 04:45:26 newdogma sshd[29511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.2.102.19 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=183.2.102.19 |
2020-09-04 15:32:27 |
| 152.101.29.177 | attack | Portscan detected |
2020-09-04 15:55:57 |
| 222.186.173.154 | attackbots | Sep 4 00:33:06 dignus sshd[25377]: Failed password for root from 222.186.173.154 port 13406 ssh2 Sep 4 00:33:10 dignus sshd[25377]: Failed password for root from 222.186.173.154 port 13406 ssh2 Sep 4 00:33:14 dignus sshd[25377]: Failed password for root from 222.186.173.154 port 13406 ssh2 Sep 4 00:33:17 dignus sshd[25377]: Failed password for root from 222.186.173.154 port 13406 ssh2 Sep 4 00:33:20 dignus sshd[25377]: Failed password for root from 222.186.173.154 port 13406 ssh2 ... |
2020-09-04 15:34:17 |
| 79.44.222.128 | attackbotsspam | Unwanted checking 80 or 443 port ... |
2020-09-04 16:09:36 |
| 81.147.185.243 | attack | Automatic report - Banned IP Access |
2020-09-04 15:46:50 |
| 188.165.236.122 | attack | Sep 4 09:41:07 vps639187 sshd\[23170\]: Invalid user rocessor from 188.165.236.122 port 50897 Sep 4 09:41:07 vps639187 sshd\[23170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122 Sep 4 09:41:09 vps639187 sshd\[23170\]: Failed password for invalid user rocessor from 188.165.236.122 port 50897 ssh2 ... |
2020-09-04 16:01:53 |
| 199.175.43.118 | attackspam |
|
2020-09-04 15:34:50 |
| 157.41.112.126 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 15:38:40 |
| 88.156.122.72 | attackspam | <6 unauthorized SSH connections |
2020-09-04 16:00:38 |
| 51.15.43.205 | attackbotsspam | 5x Failed Password |
2020-09-04 15:49:38 |
| 176.106.132.131 | attack | Sep 4 07:24:22 rancher-0 sshd[1432881]: Invalid user user from 176.106.132.131 port 33534 ... |
2020-09-04 15:43:39 |
| 217.199.212.20 | attack |
|
2020-09-04 15:57:54 |
| 164.132.70.104 | attack | Honeypot attack, port: 445, PTR: ip104.ip-164-132-70.eu. |
2020-09-04 16:08:00 |