Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: BlackHOST Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
proxy
VPN fraud
2023-04-04 12:56:53
attack
 TCP (SYN) 195.144.21.56:29011 -> port 52869, len 44
2020-10-08 03:12:19
attackspambots
[MySQL inject/portscan] tcp/3306
*(RWIN=11749)(10061547)
2020-10-07 19:26:14
attack
srvr2: (mod_security) mod_security (id:920350) triggered by 195.144.21.56 (AT/-/red3.census.shodan.io): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/16 07:30:56 [error] 20373#0: *44947 [client 195.144.21.56] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "160023425615.962953"] [ref "o0,13v47,13"], client: 195.144.21.56, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-09-16 17:05:26
attackspam
Port scan denied
2020-08-29 22:10:04
attackbotsspam
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 9002 [T]
2020-08-27 20:52:48
attackspambots
 TCP (SYN) 195.144.21.56:29011 -> port 4782, len 44
2020-08-21 17:50:17
attack
[Tue Jul 28 06:51:40 2020] - DDoS Attack From IP: 195.144.21.56 Port: 24858
2020-08-13 15:01:57
attackspam
Sent packet to closed port: 81
2020-08-09 22:10:55
attackspambots
HACKING
2020-08-08 06:23:31
attackspam
Port Scan/VNC login attempt
...
2020-08-07 07:07:45
attackbotsspam
 TCP (SYN) 195.144.21.56:17340 -> port 80, len 44
2020-06-27 15:14:22
attackbotsspam
 TCP (SYN) 195.144.21.56:23320 -> port 8889, len 44
2020-06-24 01:20:54
attack
f2b trigger Multiple SASL failures
2020-06-12 17:14:48
attackspam
 TCP (SYN) 195.144.21.56:20131 -> port 25, len 44
2020-06-10 18:55:25
attackspambots
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 1400
2020-05-29 23:47:29
attackspambots
port
2020-05-21 08:26:45
attackspam
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 5601
2020-05-07 01:44:54
attack
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 2332
2020-05-05 02:37:58
attack
May  4 02:49:34 debian-2gb-nbg1-2 kernel: \[10812276.170733\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.144.21.56 DST=195.201.40.59 LEN=32 TOS=0x08 PREC=0x00 TTL=116 ID=38891 PROTO=UDP SPT=27221 DPT=7 LEN=12
2020-05-04 08:53:15
attackspam
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 2375
2020-04-23 14:56:06
attackbotsspam
Port Scan: Events[2] countPorts[1]: 2222 ..
2020-04-16 04:30:59
attack
scan z
2020-04-08 20:42:58
Comments on same subnet:
IP Type Details Datetime
195.144.21.219 attackspam
Sep  5 07:56:34 mail sshd[9441]: Failed password for root from 195.144.21.219 port 38644 ssh2
Sep  5 07:56:36 mail sshd[9441]: Failed password for root from 195.144.21.219 port 38644 ssh2
...
2020-09-05 18:26:07
195.144.21.219 attack
2020-08-25T11:02:53.714483afi-git.jinr.ru sshd[5780]: Failed password for root from 195.144.21.219 port 52688 ssh2
2020-08-25T11:02:56.466787afi-git.jinr.ru sshd[5780]: Failed password for root from 195.144.21.219 port 52688 ssh2
2020-08-25T11:02:58.935789afi-git.jinr.ru sshd[5780]: Failed password for root from 195.144.21.219 port 52688 ssh2
2020-08-25T11:03:01.488072afi-git.jinr.ru sshd[5780]: Failed password for root from 195.144.21.219 port 52688 ssh2
2020-08-25T11:03:02.994186afi-git.jinr.ru sshd[5780]: Failed password for root from 195.144.21.219 port 52688 ssh2
...
2020-08-25 17:18:06
195.144.21.219 attackbotsspam
2020-08-20T04:20:27.871931sorsha.thespaminator.com sshd[6995]: Failed password for root from 195.144.21.219 port 35484 ssh2
2020-08-20T04:20:30.834982sorsha.thespaminator.com sshd[6995]: Failed password for root from 195.144.21.219 port 35484 ssh2
...
2020-08-20 17:18:25
195.144.21.219 attackspambots
SSH brute-force attempt
2020-08-04 18:09:58
195.144.21.219 attackbots
Invalid user admin from 195.144.21.219 port 54762
2020-07-12 13:32:55
195.144.21.225 attackbotsspam
Port scan of tcp/0 and tcp/65535 across multiple subnets that started on 06/01/2020.
2020-06-02 23:19:53
195.144.219.155 attack
email spam
2020-03-03 14:54:28
195.144.219.155 attackspam
spam
2020-01-24 14:42:44
195.144.219.155 attackbotsspam
proto=tcp  .  spt=57634  .  dpt=25  .     (Found on   Dark List de Dec 27)     (239)
2019-12-27 22:40:54
195.144.219.155 attack
2019-12-26 04:42:44 H=(tigertuna.com) [195.144.219.155]:52746 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-12-26 04:42:44 H=(tigertuna.com) [195.144.219.155]:52746 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-12-26 04:42:45 H=(tigertuna.com) [195.144.219.155]:52746 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-12-26 21:27:21
195.144.219.155 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-12-19 16:05:37
195.144.219.155 attackspambots
email spam
2019-11-08 22:15:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.144.21.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.144.21.56.			IN	A

;; AUTHORITY SECTION:
.			572	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040800 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 20:42:52 CST 2020
;; MSG SIZE  rcvd: 117
Host info
56.21.144.195.in-addr.arpa domain name pointer black.host-56.21.144.195.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.21.144.195.in-addr.arpa	name = black.host-56.21.144.195.in-addr.arpa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.24.81.169 attackspam
Invalid user tencent from 175.24.81.169 port 52808
2020-05-01 16:56:45
47.176.39.218 attack
Invalid user pri from 47.176.39.218 port 21671
2020-05-01 17:29:55
71.95.243.20 attack
"fail2ban match"
2020-05-01 17:21:01
111.229.190.111 attackspambots
Invalid user contador from 111.229.190.111 port 54590
2020-05-01 17:11:29
180.231.11.182 attackbots
Invalid user finance from 180.231.11.182 port 57956
2020-05-01 16:52:44
49.235.149.108 attackbotsspam
May  1 11:24:17 eventyay sshd[28991]: Failed password for root from 49.235.149.108 port 47966 ssh2
May  1 11:26:54 eventyay sshd[29083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.149.108
May  1 11:26:56 eventyay sshd[29083]: Failed password for invalid user steamcmd from 49.235.149.108 port 45850 ssh2
...
2020-05-01 17:27:48
95.85.12.122 attack
Unauthorized connection attempt detected from IP address 95.85.12.122 to port 2649
2020-05-01 17:16:28
111.229.249.147 attack
SSH/22 MH Probe, BF, Hack -
2020-05-01 17:10:58
69.119.114.36 attack
SSH brute-force attempt
2020-05-01 17:21:21
96.64.7.59 attackbots
[Aegis] @ 2019-12-21 05:35:34  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-05-01 17:15:58
49.247.131.96 attackbots
Invalid user ywb from 49.247.131.96 port 35500
2020-05-01 17:27:26
103.129.223.101 attack
Invalid user juan from 103.129.223.101 port 51662
2020-05-01 17:15:14
106.12.193.97 attackspam
May  1 09:07:02 game-panel sshd[20312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.97
May  1 09:07:04 game-panel sshd[20312]: Failed password for invalid user og from 106.12.193.97 port 54004 ssh2
May  1 09:10:29 game-panel sshd[20546]: Failed password for root from 106.12.193.97 port 35820 ssh2
2020-05-01 17:14:01
157.230.109.166 attackspambots
Invalid user sharon from 157.230.109.166 port 42242
2020-05-01 16:58:57
45.162.4.175 attack
Invalid user knn from 45.162.4.175 port 53054
2020-05-01 17:30:50

Recently Reported IPs

224.167.166.61 210.88.91.76 175.86.173.72 238.7.194.128
219.24.46.85 17.65.254.179 190.135.255.244 211.115.37.154
5.187.177.123 1.199.101.134 18.92.227.133 103.131.123.7
211.172.232.131 251.155.7.1 141.98.81.107 235.139.16.160
170.52.222.26 121.187.197.215 191.70.159.177 4.123.62.58