Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.46.39.0 - 195.46.39.255'

% Abuse contact for '195.46.39.0 - 195.46.39.255' is 'abuse@safedns.com'

inetnum:        195.46.39.0 - 195.46.39.255
netname:        SAFEDNS-ANYCAST-NET
country:        DE
country:        GB
country:        NL
country:        NZ
country:        US
org:            ORG-SI174-RIPE
sponsoring-org: ORG-ML847-RIPE
admin-c:        SN6176-RIPE
tech-c:         SN6176-RIPE
status:         ASSIGNED PI
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         RIPE-DB-MNT
mnt-by:         SAFEDNS-MNT
mnt-routes:     SAFEDNS-MNT
mnt-domains:    SAFEDNS-MNT
created:        2012-03-08T10:19:05Z
last-modified:  2024-06-24T15:49:16Z
source:         RIPE

organisation:   ORG-SI174-RIPE
org-name:       SafeDNS, Inc.
country:        US
org-type:       OTHER
address:        901 North Pitt Street, Suite 325
address:        Alexandria, VA 22314
address:        United States
abuse-c:        SN6176-RIPE
mnt-ref:        SAFEDNS-MNT
mnt-by:         SAFEDNS-MNT
mnt-by:         RIPE-DB-MNT
created:        2017-01-17T11:58:14Z
last-modified:  2024-06-21T09:56:32Z
source:         RIPE # Filtered

role:           SafeDNS NOC
address:        901 North Pitt Street, Suite 325
address:        Alexandria, VA 22314
address:        United States
abuse-mailbox:  abuse@safedns.com
nic-hdl:        SN6176-RIPE
mnt-by:         SAFEDNS-MNT
mnt-by:         RIPE-DB-MNT
created:        2017-01-17T11:53:09Z
last-modified:  2024-06-21T09:56:32Z
source:         RIPE # Filtered

% Information related to '195.46.39.0/24AS57926'

route:          195.46.39.0/24
descr:          SAFEDNS-ANYCAST
origin:         AS57926
mnt-by:         SAFEDNS-MNT
created:        2014-10-14T05:44:19Z
last-modified:  2017-04-03T10:51:38Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.46.39.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.46.39.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 10:54:14 CST 2026
;; MSG SIZE  rcvd: 105
Host info
40.39.46.195.in-addr.arpa domain name pointer dns2.safedns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.39.46.195.in-addr.arpa	name = dns2.safedns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
160.16.111.215 attack
Dec  6 22:29:51 MK-Soft-Root1 sshd[3358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.111.215 
Dec  6 22:29:53 MK-Soft-Root1 sshd[3358]: Failed password for invalid user fross from 160.16.111.215 port 60306 ssh2
...
2019-12-07 06:36:54
202.72.243.198 attack
Dec  6 07:55:23 php1 sshd\[8633\]: Invalid user test7 from 202.72.243.198
Dec  6 07:55:23 php1 sshd\[8633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.243.198
Dec  6 07:55:24 php1 sshd\[8633\]: Failed password for invalid user test7 from 202.72.243.198 port 49930 ssh2
Dec  6 08:01:58 php1 sshd\[9447\]: Invalid user fagart from 202.72.243.198
Dec  6 08:01:58 php1 sshd\[9447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.243.198
2019-12-07 06:54:06
193.31.24.113 attackbotsspam
12/06/2019-23:47:02.719761 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-07 06:55:46
222.186.175.140 attackspam
Dec  7 04:03:35 gw1 sshd[18124]: Failed password for root from 222.186.175.140 port 45158 ssh2
Dec  7 04:03:48 gw1 sshd[18124]: error: maximum authentication attempts exceeded for root from 222.186.175.140 port 45158 ssh2 [preauth]
...
2019-12-07 07:05:06
137.117.234.170 attack
Dec  6 12:31:22 web9 sshd\[15508\]: Invalid user monkey01 from 137.117.234.170
Dec  6 12:31:22 web9 sshd\[15508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.234.170
Dec  6 12:31:24 web9 sshd\[15508\]: Failed password for invalid user monkey01 from 137.117.234.170 port 49904 ssh2
Dec  6 12:37:43 web9 sshd\[16531\]: Invalid user crea from 137.117.234.170
Dec  6 12:37:43 web9 sshd\[16531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.234.170
2019-12-07 06:49:33
5.227.39.107 attackbotsspam
Unauthorised access (Dec  6) SRC=5.227.39.107 LEN=52 TTL=110 ID=31942 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  6) SRC=5.227.39.107 LEN=52 TTL=110 ID=18230 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-07 06:32:21
118.24.108.196 attack
$f2bV_matches
2019-12-07 07:03:45
52.178.134.11 attack
50 failed attempt(s) in the last 24h
2019-12-07 06:41:16
43.240.8.87 attack
Honeypot attack, port: 23, PTR: dns13.parkpage.foundationapi.com.
2019-12-07 06:37:27
221.195.189.144 attackspam
Dec  6 17:48:14 linuxvps sshd\[60017\]: Invalid user jader from 221.195.189.144
Dec  6 17:48:14 linuxvps sshd\[60017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.189.144
Dec  6 17:48:16 linuxvps sshd\[60017\]: Failed password for invalid user jader from 221.195.189.144 port 37958 ssh2
Dec  6 17:54:05 linuxvps sshd\[63302\]: Invalid user mackel from 221.195.189.144
Dec  6 17:54:05 linuxvps sshd\[63302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.189.144
2019-12-07 06:55:27
222.186.42.4 attack
Dec  6 23:01:51 thevastnessof sshd[3376]: Failed password for root from 222.186.42.4 port 5260 ssh2
...
2019-12-07 07:02:33
200.51.46.243 attackspam
T: f2b postfix aggressive 3x
2019-12-07 06:33:31
31.211.211.76 attackbots
3389BruteforceFW21
2019-12-07 06:45:06
217.23.79.102 attackbots
Unauthorised access (Dec  6) SRC=217.23.79.102 LEN=52 TTL=119 ID=11642 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  5) SRC=217.23.79.102 LEN=52 TTL=119 ID=30814 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-07 06:38:22
157.245.73.144 attackbots
Dec  6 09:34:59 wbs sshd\[7552\]: Invalid user ftp from 157.245.73.144
Dec  6 09:34:59 wbs sshd\[7552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144
Dec  6 09:35:01 wbs sshd\[7552\]: Failed password for invalid user ftp from 157.245.73.144 port 45896 ssh2
Dec  6 09:40:33 wbs sshd\[8269\]: Invalid user test7 from 157.245.73.144
Dec  6 09:40:33 wbs sshd\[8269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144
2019-12-07 06:35:28

Recently Reported IPs

122.193.247.198 2606:4700:10::6814:4903 2606:4700:10::6816:1904 2606:4700:10::6816:2097
2606:4700:10::6816:152 2606:4700:10::6816:49 2606:4700:10::6814:9280 2606:4700:10::6816:2143
110.78.153.73 222.167.47.43 49.212.174.16 180.153.236.150
178.104.110.60 154.17.215.183 98.14.160.193 170.64.236.186
147.185.133.16 54.197.46.85 2606:4700:10::6814:8298 2606:4700:10::ac43:997