Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.201.169.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.201.169.48.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:28:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
48.169.201.195.in-addr.arpa domain name pointer static.48.169.201.195.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.169.201.195.in-addr.arpa	name = static.48.169.201.195.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.205.132 attackbotsspam
Jul 20 14:14:51 debian sshd\[22110\]: Invalid user pao from 106.12.205.132 port 51574
Jul 20 14:14:51 debian sshd\[22110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.132
...
2019-07-20 21:15:05
119.108.63.127 attackbotsspam
23/tcp
[2019-07-20]1pkt
2019-07-20 21:06:01
90.150.203.199 attackspam
23/tcp
[2019-07-20]1pkt
2019-07-20 21:44:17
189.50.1.226 attackbotsspam
Jul 20 15:02:38 legacy sshd[18757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.1.226
Jul 20 15:02:39 legacy sshd[18757]: Failed password for invalid user rabbitmq from 189.50.1.226 port 58049 ssh2
Jul 20 15:08:27 legacy sshd[18934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.1.226
...
2019-07-20 21:17:33
160.16.225.220 attackbotsspam
Auto reported by IDS
2019-07-20 21:15:48
102.133.227.228 attack
123/udp
[2019-07-20]1pkt
2019-07-20 20:52:19
145.239.82.192 attackspam
Jul 20 14:28:05 SilenceServices sshd[12911]: Failed password for root from 145.239.82.192 port 47356 ssh2
Jul 20 14:34:29 SilenceServices sshd[16292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.192
Jul 20 14:34:31 SilenceServices sshd[16292]: Failed password for invalid user miller from 145.239.82.192 port 45580 ssh2
2019-07-20 20:52:54
197.45.163.63 attack
Automatic report - Banned IP Access
2019-07-20 21:15:24
88.244.130.32 attackspambots
23/tcp
[2019-07-20]1pkt
2019-07-20 21:31:00
178.46.162.115 attackbots
SSH Bruteforce Attack
2019-07-20 21:00:26
5.35.9.56 attackspambots
445/tcp
[2019-07-20]1pkt
2019-07-20 21:31:27
105.112.120.66 attack
445/tcp 445/tcp
[2019-07-20]2pkt
2019-07-20 21:39:22
14.231.139.178 attackspam
445/tcp
[2019-07-20]1pkt
2019-07-20 21:33:03
220.130.221.140 attackspambots
Jul 20 12:27:13 localhost sshd\[93962\]: Invalid user halflife from 220.130.221.140 port 60350
Jul 20 12:27:13 localhost sshd\[93962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.221.140
Jul 20 12:27:15 localhost sshd\[93962\]: Failed password for invalid user halflife from 220.130.221.140 port 60350 ssh2
Jul 20 12:32:18 localhost sshd\[94131\]: Invalid user sam from 220.130.221.140 port 54742
Jul 20 12:32:18 localhost sshd\[94131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.221.140
...
2019-07-20 20:57:02
49.81.92.16 attack
NOQUEUE: reject: RCPT from unknown\[49.81.92.16\]: 554 5.7.1 Service unavailable\; host \[49.81.92.16\] blocked using sbl-xbl.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBLCSS
2019-07-20 21:08:49

Recently Reported IPs

195.201.159.82 195.201.170.143 195.201.161.137 195.201.17.191
195.201.170.149 195.201.171.182 195.201.17.244 195.201.174.26
195.201.173.216 195.201.175.115 195.201.165.59 195.201.168.95
195.201.174.36 195.201.177.121 195.201.178.201 195.201.178.102
195.201.176.91 195.201.174.49 195.201.183.66 195.201.179.80