Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Valencia

Region: Valencia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.53.241.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60649
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.53.241.242.			IN	A

;; AUTHORITY SECTION:
.			422	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080701 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 08 08:15:19 CST 2020
;; MSG SIZE  rcvd: 118
Host info
242.241.53.195.in-addr.arpa is an alias for 242.224.241.53.195.in-addr.arpa.
242.224.241.53.195.in-addr.arpa domain name pointer 242.red-195-53-241.customer.static.ccgg.telefonica.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.241.53.195.in-addr.arpa	canonical name = 242.224.241.53.195.in-addr.arpa.
242.224.241.53.195.in-addr.arpa	name = 242.red-195-53-241.customer.static.ccgg.telefonica.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.7.12.245 attack
19/7/5@14:08:27: FAIL: Alarm-Intrusion address from=210.7.12.245
...
2019-07-06 03:54:56
185.93.3.114 attackbots
fell into ViewStateTrap:madrid
2019-07-06 03:20:12
78.16.69.248 attack
Autoban   78.16.69.248 AUTH/CONNECT
2019-07-06 03:29:51
113.141.64.69 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-06 04:03:45
182.148.114.139 attackbotsspam
Jul  6 01:04:47 itv-usvr-02 sshd[17205]: Invalid user guest from 182.148.114.139 port 48793
Jul  6 01:04:47 itv-usvr-02 sshd[17205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.114.139
Jul  6 01:04:47 itv-usvr-02 sshd[17205]: Invalid user guest from 182.148.114.139 port 48793
Jul  6 01:04:49 itv-usvr-02 sshd[17205]: Failed password for invalid user guest from 182.148.114.139 port 48793 ssh2
Jul  6 01:07:49 itv-usvr-02 sshd[17213]: Invalid user chai from 182.148.114.139 port 33105
2019-07-06 04:05:14
95.81.0.51 attack
PORN SPAM !
2019-07-06 03:43:35
89.110.48.143 attackbots
Brute force attempt
2019-07-06 04:04:53
165.231.133.72 attackspam
Automatic report - Web App Attack
2019-07-06 03:51:47
125.212.226.104 attack
SMB Server BruteForce Attack
2019-07-06 03:53:21
119.201.214.130 attack
Jul  5 21:07:36 [host] sshd[23732]: Invalid user vid from 119.201.214.130
Jul  5 21:07:36 [host] sshd[23732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.201.214.130
Jul  5 21:07:38 [host] sshd[23732]: Failed password for invalid user vid from 119.201.214.130 port 52661 ssh2
2019-07-06 03:48:54
140.143.206.137 attackbotsspam
Unauthorized SSH login attempts
2019-07-06 03:40:14
87.253.33.241 attackbots
Autoban   87.253.33.241 AUTH/CONNECT
2019-07-06 03:42:47
171.235.164.159 attackspambots
[ER hit] Tried to deliver spam. Already well known.
2019-07-06 03:38:12
92.114.18.54 attackbots
ft-1848-basketball.de 92.114.18.54 \[05/Jul/2019:20:09:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 2171 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-basketball.de 92.114.18.54 \[05/Jul/2019:20:09:49 +0200\] "POST /wp-login.php HTTP/1.1" 200 2143 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-06 03:17:56
117.48.205.14 attackspam
Jul  5 20:09:00 vps65 sshd\[12741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.205.14  user=root
Jul  5 20:09:01 vps65 sshd\[12741\]: Failed password for root from 117.48.205.14 port 40366 ssh2
...
2019-07-06 03:40:28

Recently Reported IPs

220.133.60.182 174.247.117.143 113.89.35.216 193.65.213.186
168.187.95.23 63.228.42.151 196.195.181.48 128.199.65.185
66.208.199.59 51.75.173.237 27.68.251.37 79.26.140.205
177.95.95.33 223.110.151.193 153.206.5.251 193.250.122.36
17.91.193.56 198.126.165.31 117.177.231.59 183.244.50.215