Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Anadia

Region: Aveiro

Country: Portugal

Internet Service Provider: NOS

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.23.55.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7871
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.23.55.254.			IN	A

;; AUTHORITY SECTION:
.			557	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032102 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 17:39:08 CST 2022
;; MSG SIZE  rcvd: 106
Host info
254.55.23.195.in-addr.arpa domain name pointer 195-23-55-254.net.static.novis.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.55.23.195.in-addr.arpa	name = 195-23-55-254.net.static.novis.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.212.253.150 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:17:54
117.69.47.207 attack
Oct 23 13:25:06 tux postfix/smtpd[13813]: connect from unknown[117.69.47.207]
Oct x@x
Oct 23 13:25:10 tux postfix/smtpd[13813]: disconnect from unknown[117.69.47.207]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.69.47.207
2019-10-24 02:15:51
46.101.17.215 attackspambots
Invalid user vpopmail from 46.101.17.215 port 49130
2019-10-24 02:00:28
203.150.171.24 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:01:16
35.187.99.216 attackbots
Port Scan
2019-10-24 01:36:28
95.85.60.251 attackbots
5x Failed Password
2019-10-24 01:35:01
202.29.228.241 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 01:47:39
203.195.177.202 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:08:19
139.198.18.120 attackspambots
Oct 23 18:49:07 DAAP sshd[18052]: Invalid user guest2 from 139.198.18.120 port 52112
Oct 23 18:49:07 DAAP sshd[18052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.18.120
Oct 23 18:49:07 DAAP sshd[18052]: Invalid user guest2 from 139.198.18.120 port 52112
Oct 23 18:49:09 DAAP sshd[18052]: Failed password for invalid user guest2 from 139.198.18.120 port 52112 ssh2
Oct 23 18:54:03 DAAP sshd[18108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.18.120  user=root
Oct 23 18:54:06 DAAP sshd[18108]: Failed password for root from 139.198.18.120 port 33124 ssh2
...
2019-10-24 01:53:12
188.245.250.100 attackspam
Excessive Port-Scanning
2019-10-24 01:57:50
185.209.0.90 attackbots
10/23/2019-18:30:01.211139 185.209.0.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-24 01:45:05
202.75.210.43 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 01:48:50
216.198.73.21 attackbots
Port 1433 Scan
2019-10-24 02:06:50
5.26.134.240 attackbotsspam
Unauthorised access (Oct 23) SRC=5.26.134.240 LEN=44 TOS=0x08 PREC=0x20 TTL=51 ID=43608 TCP DPT=23 WINDOW=14450 SYN
2019-10-24 02:04:19
213.153.166.128 attackspam
RDP-Bruteforce | Cancer2Ban-Autoban for Windows (see: https://github.com/Zeziroth/Cancer2Ban)
2019-10-24 01:39:25

Recently Reported IPs

202.250.79.135 188.204.154.100 126.66.244.78 216.174.95.180
31.22.144.102 111.10.245.110 185.38.49.181 106.5.172.215
113.160.186.42 208.59.190.134 86.235.188.161 178.139.187.187
195.201.3.48 150.222.244.31 68.131.36.160 52.95.38.210
217.55.124.57 184.45.207.13 204.80.165.240 144.108.39.204