City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '95.179.242.0 - 95.179.243.255'
% Abuse contact for '95.179.242.0 - 95.179.243.255' is 'abuse@vultr.com'
inetnum: 95.179.242.0 - 95.179.243.255
created: 2019-05-16T19:00:04Z
last-modified: 2019-05-16T19:00:04Z
source: RIPE
netname: NET-V4-95-179-128-0-17
descr: Hanauer Landstrae 302
descr: 60314 Frankfurt am Main
descr: Germany
country: DE
geoloc: 50.1200 8.7334
org: ORG-VHLF1-RIPE
admin-c: VHLF1-RIPE
tech-c: VHLF2-RIPE
status: ASSIGNED PA
mnt-by: MAINT-AS20473
organisation: ORG-VHLF1-RIPE
phone: +1-973-849-0500
admin-c: VHLF1-RIPE
tech-c: VHLF2-RIPE
abuse-c: VHLF3-RIPE
mnt-ref: MAINT-AS20473
mnt-by: MAINT-AS20473
created: 2017-12-26T21:41:29Z
last-modified: 2017-12-26T21:41:29Z
source: RIPE # Filtered
org-name: Vultr Holdings LLC Frankfurt
org-type: OTHER
address: Hanauer Landstrae 302
address: 60314 Frankfurt am Main
address: Germany
person: Vultr Holdings LLC Frankfurt Admin
created: 2017-12-26T21:41:28Z
last-modified: 2017-12-26T21:41:28Z
source: RIPE # Filtered
address: 14 Cliffwood Ave Suite 300, Metropark South
address: Matawan, NJ 07747
address: United States
phone: +1-973-849-0500
mnt-by: MAINT-AS20473
nic-hdl: VHLF1-RIPE
person: Vultr Holdings LLC Frankfurt Tech
created: 2017-12-26T21:41:29Z
last-modified: 2017-12-26T21:41:29Z
source: RIPE # Filtered
address: 14 Cliffwood Ave Suite 300, Metropark South
address: Matawan, NJ 07747
address: United States
phone: +1-973-849-0500
mnt-by: MAINT-AS20473
nic-hdl: VHLF2-RIPE
% Information related to '95.179.240.0/20AS20473'
route: 95.179.240.0/20
origin: AS20473
descr: Vultr Assigned Prefix
mnt-by: MAINT-AS20473
created: 2026-01-05T22:37:26Z
last-modified: 2026-01-05T22:37:26Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.179.242.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;95.179.242.229. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040601 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 03:44:51 CST 2026
;; MSG SIZE rcvd: 107
229.242.179.95.in-addr.arpa domain name pointer 95.179.242.229.vultrusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
229.242.179.95.in-addr.arpa name = 95.179.242.229.vultrusercontent.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 181.234.90.154 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 10-02-2020 22:10:26. |
2020-02-11 09:26:45 |
| 221.228.97.218 | attack | 221.228.97.218 was recorded 6 times by 1 hosts attempting to connect to the following ports: 53413. Incident counter (4h, 24h, all-time): 6, 50, 342 |
2020-02-11 09:19:32 |
| 37.49.231.163 | attack | firewall-block, port(s): 50802/tcp |
2020-02-11 09:29:23 |
| 220.130.148.192 | attackbots | firewall-block, port(s): 445/tcp |
2020-02-11 09:47:20 |
| 206.189.47.166 | attackspambots | *Port Scan* detected from 206.189.47.166 (SG/Singapore/-). 4 hits in the last 20 seconds |
2020-02-11 09:31:07 |
| 114.39.106.170 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 10-02-2020 22:10:18. |
2020-02-11 09:40:34 |
| 200.57.249.23 | attack | Automatic report - Port Scan Attack |
2020-02-11 09:33:08 |
| 222.82.237.238 | attack | Feb 11 02:22:44 sd-53420 sshd\[17721\]: Invalid user ojx from 222.82.237.238 Feb 11 02:22:44 sd-53420 sshd\[17721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.237.238 Feb 11 02:22:46 sd-53420 sshd\[17721\]: Failed password for invalid user ojx from 222.82.237.238 port 34303 ssh2 Feb 11 02:25:49 sd-53420 sshd\[18022\]: Invalid user zyu from 222.82.237.238 Feb 11 02:25:49 sd-53420 sshd\[18022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.237.238 ... |
2020-02-11 09:32:42 |
| 178.62.115.51 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 09:46:14 |
| 94.77.193.230 | attackbotsspam | Honeypot attack, port: 445, PTR: 94-77-193-230.static.go.com.sa. |
2020-02-11 09:28:56 |
| 51.91.56.133 | attackbotsspam | Feb 10 23:33:56 ws26vmsma01 sshd[58854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.56.133 Feb 10 23:33:58 ws26vmsma01 sshd[58854]: Failed password for invalid user uqa from 51.91.56.133 port 37136 ssh2 ... |
2020-02-11 09:25:15 |
| 159.65.35.14 | attackbots | Feb 10 15:27:14 hpm sshd\[1749\]: Invalid user iae from 159.65.35.14 Feb 10 15:27:14 hpm sshd\[1749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.35.14 Feb 10 15:27:16 hpm sshd\[1749\]: Failed password for invalid user iae from 159.65.35.14 port 45732 ssh2 Feb 10 15:30:09 hpm sshd\[2060\]: Invalid user xob from 159.65.35.14 Feb 10 15:30:09 hpm sshd\[2060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.35.14 |
2020-02-11 09:47:57 |
| 124.123.28.162 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 10-02-2020 22:10:20. |
2020-02-11 09:37:13 |
| 222.84.187.181 | attackbotsspam | firewall-block, port(s): 23/tcp |
2020-02-11 09:45:43 |
| 49.233.162.225 | attack | Feb 11 02:26:35 legacy sshd[6237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.162.225 Feb 11 02:26:37 legacy sshd[6237]: Failed password for invalid user qrw from 49.233.162.225 port 33128 ssh2 Feb 11 02:29:51 legacy sshd[6491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.162.225 ... |
2020-02-11 09:41:53 |