Be aware of vulnerabilities.
Where it is being abused:
https://www.abuseipdb.com/check/2a00:6020:b098:600:5dc4:7f9a:5d25:7bfFound on what domain: -https://www.shodan.io/search?query=deutsche-glasfaser.de
Server vulnerabilities there: -https://www.tenable.com/plugins/nessus/172186 Plugins
Nessus 172186
Apache 2.4.x < 2.4.56 Multiple Vulnerabilities -> -https://blog.qualys.com/vulnerabilities-threat-research/2021/10/27/apache-http-server-path-traversal-remote-code-execution-cve-2021-41773-cve-2021-42013
Make above links life whenever being active in research or qualified to do so,Also links to: -https://www.shodan.io/search?query=bc.googleusercontent.com
Vulnerabilities in Python SMTP 1.4.2 -> -https://security.snyk.io/package/pip/py/1.4.2 (Re-DOS-able).
polonus