City: Kempten (Allgäu)
Region: Bayern
Country: Germany
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 91.66.146.253 | attackspambots | $f2bV_matches |
2020-01-15 06:41:58 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '91.66.0.0 - 91.66.255.255'
% Abuse contact for '91.66.0.0 - 91.66.255.255' is 'abuse.de@vodafone.com'
inetnum: 91.66.0.0 - 91.66.255.255
netname: KABEL-DEUTSCHLAND-CUSTOMER-SERVICES-13
descr: Kabel Deutschland Breitband Customer 13
country: DE
admin-c: KDG40-RIPE
tech-c: KDG40-RIPE
status: ASSIGNED PA
mnt-by: MNT-KABELDEUTSCHLAND
mnt-lower: MNT-KABELDEUTSCHLAND
mnt-routes: MNT-KABELDEUTSCHLAND
created: 2007-07-20T12:20:01Z
last-modified: 2015-06-09T13:28:29Z
source: RIPE
role: Kabel Deutschland RIPE
address: Vodafone Kabel Deutschland GmbH
address: Germaniastr. 14-17
address: 12099 Berlin
address: Germany
admin-c: FM464-RIPE
admin-c: MM45323-RIPE
tech-c: MM45323-RIPE
abuse-mailbox: abuse.de@vodafone.com
nic-hdl: KDG40-RIPE
mnt-by: MNT-KABELDEUTSCHLAND
created: 2015-06-06T09:42:03Z
last-modified: 2019-10-28T12:25:04Z
source: RIPE # Filtered
% Information related to '91.66.128.0/17AS31334'
route: 91.66.128.0/17
descr: Kabeldeutschland Route
origin: AS31334
mnt-by: MNT-KABELDEUTSCHLAND
created: 2009-04-20T13:22:26Z
last-modified: 2009-04-20T13:22:26Z
source: RIPE
% Information related to '91.66.128.0/17AS3209'
route: 91.66.128.0/17
origin: AS3209
descr: VFKD Route
mnt-routes: ARCOR-MNT
mnt-by: MNT-KABELDEUTSCHLAND
mnt-by: MNT-AS31334
created: 2020-06-16T10:16:00Z
last-modified: 2020-06-16T10:16:00Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.1 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.66.146.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.66.146.156. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 20:17:14 CST 2026
;; MSG SIZE rcvd: 106
156.146.66.91.in-addr.arpa domain name pointer ip5b42929c.dynamic.kabel-deutschland.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
156.146.66.91.in-addr.arpa name = ip5b42929c.dynamic.kabel-deutschland.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.84.244.47 | attackbots | Unauthorized connection attempt detected from IP address 41.84.244.47 to port 23 [T] |
2020-05-06 07:56:49 |
| 36.34.162.175 | attackspambots | Unauthorized connection attempt detected from IP address 36.34.162.175 to port 26 [T] |
2020-05-06 07:57:51 |
| 101.50.93.138 | attack | [05/May/2020:19:51:36 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1" |
2020-05-06 07:21:29 |
| 60.6.114.216 | attack | Unauthorized connection attempt detected from IP address 60.6.114.216 to port 23 [T] |
2020-05-06 07:53:01 |
| 46.225.253.65 | attackspambots | Unauthorised access (May 5) SRC=46.225.253.65 LEN=52 TTL=110 ID=32637 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-06 07:55:30 |
| 61.133.194.58 | attackbots | Unauthorized connection attempt detected from IP address 61.133.194.58 to port 23 [T] |
2020-05-06 07:51:46 |
| 139.155.118.190 | attack | Unauthorized connection attempt detected from IP address 139.155.118.190 to port 711 [T] |
2020-05-06 07:36:05 |
| 47.105.110.61 | attackbots | Unauthorized connection attempt detected from IP address 47.105.110.61 to port 1987 [T] |
2020-05-06 07:55:07 |
| 39.74.163.69 | attackspam | Unauthorized connection attempt detected from IP address 39.74.163.69 to port 23 [T] |
2020-05-06 07:57:34 |
| 176.197.101.202 | attackbotsspam | Honeypot attack, port: 5555, PTR: 176-197-101-202.goodline.info. |
2020-05-06 07:32:53 |
| 221.12.107.194 | attack | Unauthorized connection attempt detected from IP address 221.12.107.194 to port 1433 [T] |
2020-05-06 07:24:34 |
| 172.104.242.173 | attack | Brute force attack stopped by firewall |
2020-05-06 07:33:30 |
| 61.174.214.36 | attackspam | Unauthorized connection attempt detected from IP address 61.174.214.36 to port 445 [T] |
2020-05-06 07:51:22 |
| 223.155.22.2 | attackbots | Unauthorized connection attempt detected from IP address 223.155.22.2 to port 23 [T] |
2020-05-06 07:23:38 |
| 27.35.108.153 | attackbots | Unauthorized connection attempt detected from IP address 27.35.108.153 to port 23 [T] |
2020-05-06 07:58:28 |