Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Irkutsk

Region: Irkutsk Oblast

Country: Russia

Internet Service Provider: Irkutsk Business Net

Hostname: unknown

Organization: Irkutsk Business Net

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Unauthorized connection attempt from IP address 195.206.55.154 on Port 445(SMB)
2020-08-02 18:40:29
attack
Port probing on unauthorized port 445
2020-04-19 23:43:25
attack
Unauthorized connection attempt from IP address 195.206.55.154 on Port 445(SMB)
2020-04-08 07:14:04
attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:50:37
attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 08:54:48
attack
Unauthorized connection attempt detected from IP address 195.206.55.154 to port 445
2020-01-13 23:31:23
attack
445/tcp 445/tcp 445/tcp...
[2019-09-14/11-14]9pkt,1pt.(tcp)
2019-11-14 13:10:31
attackspambots
Unauthorised access (Nov  1) SRC=195.206.55.154 LEN=52 TTL=116 ID=15470 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-01 22:28:01
attackspam
Unauthorized connection attempt from IP address 195.206.55.154 on Port 445(SMB)
2019-10-02 07:52:04
attack
Attempt To attack host OS, exploiting network vulnerabilities, on 16-09-2019 22:09:21.
2019-09-17 07:23:23
attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 20:56:22,564 INFO [amun_request_handler] PortScan Detected on Port: 445 (195.206.55.154)
2019-07-21 06:49:56
attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 00:03:02,860 INFO [shellcode_manager] (195.206.55.154) no match, writing hexdump (fe9454449268a0509d59a45e0e9a3b13 :14902) - SMB (Unknown)
2019-07-19 11:18:17
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.206.55.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50498
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.206.55.154.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 04 19:08:32 +08 2019
;; MSG SIZE  rcvd: 118

Host info
154.55.206.195.in-addr.arpa domain name pointer host1.ubileyniy.cust.dsi.ru.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
154.55.206.195.in-addr.arpa	name = host1.ubileyniy.cust.dsi.ru.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.14 attack
03/25/2020-08:13:32.412600 185.176.27.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-25 20:20:14
218.24.45.75 attackspam
Port 8080 (HTTP proxy) access denied
2020-03-25 20:06:17
192.241.237.45 attack
Port 995 scan denied
2020-03-25 19:29:49
198.108.66.228 attackbotsspam
Port 9874 scan denied
2020-03-25 20:11:29
122.228.19.80 attack
scans 6 times in preceeding hours on the ports (in chronological order) 1201 3001 8004 5000 8000 2379 resulting in total of 6 scans from 122.228.19.64/27 block.
2020-03-25 20:28:35
185.176.27.102 attack
03/25/2020-08:12:33.626921 185.176.27.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-25 20:16:50
49.51.12.25 attackspambots
Unauthorized connection attempt detected from IP address 49.51.12.25 to port 5001
2020-03-25 20:01:02
185.176.27.166 attack
Port 56910 scan denied
2020-03-25 20:15:52
185.156.73.38 attackbots
Fail2Ban Ban Triggered
2020-03-25 20:22:57
222.186.15.236 attackspam
firewall-block, port(s): 22/tcp
2020-03-25 20:04:38
164.68.112.178 attack
scans 3 times in preceeding hours on the ports (in chronological order) 5900 8080 8883
2020-03-25 20:27:27
185.143.221.85 attackbots
IP: 185.143.221.85
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS49505 OOO Network of data-centers Selectel
   Netherlands (NL)
   CIDR 185.143.221.0/24
Log Date: 25/03/2020 11:27:24 AM UTC
2020-03-25 20:23:14
128.14.137.181 attackspam
Port 9200 scan denied
2020-03-25 19:52:37
202.134.61.41 attackspambots
Unauthorized connection attempt from IP address 202.134.61.41 on Port 3389(RDP)
2020-03-25 20:07:39
162.243.130.108 attackspam
Honeypot hit.
2020-03-25 19:45:27

Recently Reported IPs

46.175.132.219 5.251.221.121 5.178.142.142 177.158.167.5
162.243.11.104 93.23.6.66 27.213.38.210 216.218.206.69
124.135.15.55 81.22.10.229 75.4.214.93 60.54.119.170
41.37.148.142 18.235.66.149 118.113.147.35 106.186.122.254
54.214.48.160 171.228.202.180 188.219.192.252 154.68.39.6