Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wolfsberg

Region: Karnten

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '91.113.0.0 - 91.113.127.255'

% Abuse contact for '91.113.0.0 - 91.113.127.255' is 'abuse@a1.at'

inetnum:        91.113.0.0 - 91.113.127.255
netname:        A1TA-HSI
descr:          High Speed Internet Customers
descr:          A1 Telekom Austria AG
country:        AT
admin-c:        HMH25-RIPE
tech-c:         AAH12-RIPE
tech-c:         DAH12-RIPE
tech-c:         HMH25-RIPE
status:         ASSIGNED PA
remarks:        please contact abuse @ a1telekom.at for criminal use, portscan, SPAM, etc.
mnt-by:         AS8447-MNT
mnt-lower:      AS8447-MNT
created:        2025-06-11T09:22:54Z
last-modified:  2025-06-11T09:22:54Z
source:         RIPE

role:           Abuse Admin Highway
address:        A1 Telekom Austria AG
address:        Postfach 1001
address:        1011 Wien
address:        Austria
phone:          +43 50664 0
fax-no:         +43 50664 49210
abuse-mailbox:  abuse@a1.at
admin-c:        SD5741-RIPE
tech-c:         SD5741-RIPE
nic-hdl:        AAH12-RIPE
remarks:        **************************************************
remarks:        * CONTACT FOR CRIMINAL USE, PORTSCAN, SPAM, ETC. *
remarks:        **************************************************
mnt-by:         AS8447-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2018-05-23T10:09:13Z
source:         RIPE # Filtered

role:           Domain Admin Highway
address:        A1 Telekom Austria AG
address:        Arsenal Objekt 24
address:        1030 Wien
address:        Austria
phone:          +43 50664 0
fax-no:         +43 50664 44414
abuse-mailbox:  abuse@a1.at
admin-c:        WC82-RIPE
tech-c:         CW6434-RIPE
tech-c:         WC82-RIPE
nic-hdl:        DAH12-RIPE
mnt-by:         AS8447-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2018-05-23T10:24:35Z
source:         RIPE # Filtered

role:           Host Master Highway
address:        A1 Telekom Austria AG
address:        Arsenal Objekt 24
address:        1030 Vienna
address:        Austria
phone:          +43 50 664 8 664 100
fax-no:         +43 50 664 8 664 101
abuse-mailbox:  abuse@a1.at
remarks:        for database maintenance please contact
remarks:        < hostmaster @ aon.at >
admin-c:        AJ2061-RIPE
tech-c:         AJ2061-RIPE
nic-hdl:        HMH25-RIPE
mnt-by:         AS8447-MNT
created:        2002-05-31T10:41:49Z
last-modified:  2026-01-26T08:40:49Z
source:         RIPE # Filtered

% Information related to '91.112.0.0/14AS8447'

route:          91.112.0.0/14
descr:          HIGHWAY194
origin:         AS8447
mnt-by:         AS8447-MNT
created:        2006-09-04T12:54:53Z
last-modified:  2018-06-26T13:27:59Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.113.72.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.113.72.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042301 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 24 11:06:23 CST 2026
;; MSG SIZE  rcvd: 105
Host info
52.72.113.91.in-addr.arpa domain name pointer 91-113-72-52.adsl.highway.telekom.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.72.113.91.in-addr.arpa	name = 91-113-72-52.adsl.highway.telekom.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.99.4.65 attackbots
Aug 19 20:05:39 vtv3 sshd\[654\]: Invalid user ftptest from 167.99.4.65 port 37642
Aug 19 20:05:39 vtv3 sshd\[654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.4.65
Aug 19 20:05:42 vtv3 sshd\[654\]: Failed password for invalid user ftptest from 167.99.4.65 port 37642 ssh2
Aug 19 20:10:23 vtv3 sshd\[3100\]: Invalid user rh from 167.99.4.65 port 55076
Aug 19 20:10:23 vtv3 sshd\[3100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.4.65
Aug 19 20:23:45 vtv3 sshd\[9466\]: Invalid user ts3user from 167.99.4.65 port 50908
Aug 19 20:23:45 vtv3 sshd\[9466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.4.65
Aug 19 20:23:47 vtv3 sshd\[9466\]: Failed password for invalid user ts3user from 167.99.4.65 port 50908 ssh2
Aug 19 20:28:15 vtv3 sshd\[11745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.4.65  user=roo
2019-08-20 05:02:03
142.93.114.123 attackbotsspam
Aug 19 11:32:16 eddieflores sshd\[23432\]: Invalid user ec2-user from 142.93.114.123
Aug 19 11:32:16 eddieflores sshd\[23432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123
Aug 19 11:32:18 eddieflores sshd\[23432\]: Failed password for invalid user ec2-user from 142.93.114.123 port 55342 ssh2
Aug 19 11:36:23 eddieflores sshd\[23887\]: Invalid user hadoop from 142.93.114.123
Aug 19 11:36:23 eddieflores sshd\[23887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123
2019-08-20 05:41:51
177.66.225.150 attack
failed_logins
2019-08-20 05:01:39
217.112.128.198 attackspambots
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-08-20 05:27:52
165.22.26.134 attackspambots
Aug 19 10:59:23 php1 sshd\[26373\]: Invalid user radiusd from 165.22.26.134
Aug 19 10:59:23 php1 sshd\[26373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.26.134
Aug 19 10:59:25 php1 sshd\[26373\]: Failed password for invalid user radiusd from 165.22.26.134 port 37558 ssh2
Aug 19 11:03:27 php1 sshd\[26740\]: Invalid user satish from 165.22.26.134
Aug 19 11:03:27 php1 sshd\[26740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.26.134
2019-08-20 05:18:50
142.234.39.4 attackspambots
08/19/2019-17:05:56.223070 142.234.39.4 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-20 05:07:44
219.84.203.57 attackspam
Aug 19 21:34:36 Ubuntu-1404-trusty-64-minimal sshd\[19439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.84.203.57  user=root
Aug 19 21:34:38 Ubuntu-1404-trusty-64-minimal sshd\[19439\]: Failed password for root from 219.84.203.57 port 60022 ssh2
Aug 19 23:31:43 Ubuntu-1404-trusty-64-minimal sshd\[16901\]: Invalid user www from 219.84.203.57
Aug 19 23:31:43 Ubuntu-1404-trusty-64-minimal sshd\[16901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.84.203.57
Aug 19 23:31:44 Ubuntu-1404-trusty-64-minimal sshd\[16901\]: Failed password for invalid user www from 219.84.203.57 port 34114 ssh2
2019-08-20 05:36:56
188.226.250.187 attack
SSH Brute Force, server-1 sshd[18451]: Failed password for invalid user nginx from 188.226.250.187 port 60737 ssh2
2019-08-20 05:21:43
159.65.255.153 attack
Aug 19 23:42:15 yabzik sshd[14181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.255.153
Aug 19 23:42:17 yabzik sshd[14181]: Failed password for invalid user temp from 159.65.255.153 port 47622 ssh2
Aug 19 23:46:08 yabzik sshd[15501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.255.153
2019-08-20 05:03:24
51.75.30.199 attackspambots
Aug 19 23:07:54 SilenceServices sshd[4708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.30.199
Aug 19 23:07:56 SilenceServices sshd[4708]: Failed password for invalid user mirror03 from 51.75.30.199 port 43496 ssh2
Aug 19 23:11:47 SilenceServices sshd[7106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.30.199
2019-08-20 05:21:20
222.127.99.45 attackspam
$f2bV_matches
2019-08-20 05:44:02
50.96.52.82 attackbotsspam
19/8/19@14:56:56: FAIL: Alarm-Intrusion address from=50.96.52.82
...
2019-08-20 05:00:34
46.39.224.200 attackbotsspam
Aug 19 22:46:21 vps647732 sshd[16434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.39.224.200
Aug 19 22:46:23 vps647732 sshd[16434]: Failed password for invalid user wargames from 46.39.224.200 port 39208 ssh2
...
2019-08-20 04:58:38
156.38.214.90 attackbots
2019-08-19T23:08:20.306638  sshd[6024]: Invalid user webusers from 156.38.214.90 port 23041
2019-08-19T23:08:20.320225  sshd[6024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.38.214.90
2019-08-19T23:08:20.306638  sshd[6024]: Invalid user webusers from 156.38.214.90 port 23041
2019-08-19T23:08:22.449182  sshd[6024]: Failed password for invalid user webusers from 156.38.214.90 port 23041 ssh2
2019-08-19T23:13:34.036794  sshd[6087]: Invalid user spotlight from 156.38.214.90 port 55160
...
2019-08-20 05:30:40
120.131.3.66 attackbots
ssh intrusion attempt
2019-08-20 05:38:04

Recently Reported IPs

34.52.230.250 32.16.242.188 247.111.210.150 2606:4700:10::ac43:969
2606:4700:10::6814:5744 54.86.115.253 64.64.253.150 162.216.149.207
2606:4700:10::6816:4568 2606:4700:10::6814:5089 2606:4700:10::ac43:800 2606:4700:10::6814:9408
121.234.219.117 2606:4700:10::6816:3969 20.221.72.115 129.212.225.61
2001:41d0:801:2000::5add 23.111.14.190 2606:4700:10::6816:1122 2606:4700:10::6814:6975