City: Viernheim
Region: Hessen
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '93.224.0.0 - 93.239.255.255'
% Abuse contact for '93.224.0.0 - 93.239.255.255' is 'abuse@telekom.de'
inetnum: 93.224.0.0 - 93.239.255.255
netname: DTAG-DIAL28
descr: Deutsche Telekom AG
org: ORG-DTAG1-RIPE
country: DE
admin-c: DTIP
tech-c: DTST
status: ASSIGNED PA
mnt-by: DTAG-NIC
created: 2009-06-09T12:46:58Z
last-modified: 2014-06-18T06:32:46Z
source: RIPE
organisation: ORG-DTAG1-RIPE
org-name: Deutsche Telekom AG
org-type: OTHER
address: Group Information Security, SDA/Abuse
address: Deutsche Telekom Allee 9
address: DE 64295 Darmstadt
remarks: abuse contact in case of Spam,
hack attacks, illegal activity,
violation, scans, probes, etc.
mnt-ref: DTAG-NIC
mnt-by: DTAG-NIC
abuse-c: DTAG4-RIPE
created: 2014-06-17T11:47:04Z
last-modified: 2021-02-22T13:35:19Z
source: RIPE # Filtered
person: DTAG Global IP-Addressing
address: Deutsche Telekom AG
address: Darmstadt, Germany
phone: +49 180 2 33 1000
nic-hdl: DTIP
mnt-by: DTAG-NIC
created: 2003-01-29T10:22:59Z
last-modified: 2019-05-14T12:55:19Z
source: RIPE # Filtered
person: Security Team
address: Deutsche Telekom AG
address: Darmstadt, Germany
phone: +49 180 2 33 1000
nic-hdl: DTST
mnt-by: DTAG-NIC
created: 2003-01-29T10:31:11Z
last-modified: 2019-05-14T12:56:39Z
source: RIPE # Filtered
% Information related to '93.192.0.0/10AS3320'
route: 93.192.0.0/10
descr: Deutsche Telekom AG
Internet Service Provider
origin: AS3320
member-of: AS3320:RS-PA-TELEKOM
mnt-by: DTAG-RR
created: 2008-02-13T12:30:44Z
last-modified: 2008-02-13T12:30:44Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.224.200.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.224.200.0. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041000 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 15:22:55 CST 2026
;; MSG SIZE rcvd: 105
0.200.224.93.in-addr.arpa domain name pointer p5de0c800.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
0.200.224.93.in-addr.arpa name = p5de0c800.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.253.254.100 | attackspam | unauthorized connection attempt |
2020-01-17 13:37:08 |
| 1.64.50.251 | attackspambots | unauthorized connection attempt |
2020-01-17 13:29:18 |
| 211.72.231.13 | attackspam | unauthorized connection attempt |
2020-01-17 13:31:10 |
| 117.197.4.151 | attackbots | unauthorized connection attempt |
2020-01-17 13:22:38 |
| 104.158.33.232 | attackbots | unauthorized connection attempt |
2020-01-17 13:59:00 |
| 98.254.67.56 | attackbots | unauthorized connection attempt |
2020-01-17 13:22:55 |
| 95.59.143.29 | attackbots | unauthorized connection attempt |
2020-01-17 13:23:12 |
| 180.177.57.195 | attackbots | unauthorized connection attempt |
2020-01-17 13:45:07 |
| 36.90.252.43 | attack | unauthorized connection attempt |
2020-01-17 13:28:46 |
| 144.91.120.84 | attackbots | unauthorized connection attempt |
2020-01-17 13:21:20 |
| 173.70.96.55 | attackbots | unauthorized connection attempt |
2020-01-17 13:48:00 |
| 58.152.31.87 | attackspambots | unauthorized connection attempt |
2020-01-17 13:26:33 |
| 180.113.21.110 | attackspambots | unauthorized connection attempt |
2020-01-17 13:45:25 |
| 165.22.24.21 | attackspambots | unauthorized connection attempt |
2020-01-17 13:49:14 |
| 187.162.23.106 | attackbotsspam | unauthorized connection attempt |
2020-01-17 13:42:50 |