Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.53.50.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.53.50.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:45:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
213.50.53.195.in-addr.arpa is an alias for 213.0.50.53.195.in-addr.arpa.
213.0.50.53.195.in-addr.arpa domain name pointer 213.red-195-53-50.customer.static.ccgg.telefonica.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.50.53.195.in-addr.arpa	canonical name = 213.0.50.53.195.in-addr.arpa.
213.0.50.53.195.in-addr.arpa	name = 213.red-195-53-50.customer.static.ccgg.telefonica.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.123.223.20 attackbotsspam
445/tcp
[2019-09-24]1pkt
2019-09-25 06:42:03
117.94.3.113 attack
23/tcp
[2019-09-24]1pkt
2019-09-25 06:47:41
167.71.189.145 attackbots
6379/tcp
[2019-09-24]1pkt
2019-09-25 07:15:36
218.92.0.137 attackspam
$f2bV_matches
2019-09-25 07:06:04
5.39.79.48 attackspambots
$f2bV_matches
2019-09-25 07:03:12
218.92.0.192 attack
Sep 25 00:56:39 legacy sshd[30110]: Failed password for root from 218.92.0.192 port 16767 ssh2
Sep 25 00:57:17 legacy sshd[30114]: Failed password for root from 218.92.0.192 port 24301 ssh2
...
2019-09-25 07:01:54
82.196.4.46 attackbots
Sep 25 00:11:45 localhost sshd\[7135\]: Invalid user hui from 82.196.4.46
Sep 25 00:11:45 localhost sshd\[7135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.46
Sep 25 00:11:47 localhost sshd\[7135\]: Failed password for invalid user hui from 82.196.4.46 port 56958 ssh2
Sep 25 00:15:35 localhost sshd\[7350\]: Invalid user lmx from 82.196.4.46
Sep 25 00:15:35 localhost sshd\[7350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.46
...
2019-09-25 06:59:10
51.77.91.134 attackspambots
$f2bV_matches
2019-09-25 06:44:02
118.32.165.111 attackspam
Netgear DGN Device Remote Command Execution Vulnerability
2019-09-25 07:05:07
162.241.193.116 attackbots
Sep 25 00:16:02 tux-35-217 sshd\[16861\]: Invalid user admin from 162.241.193.116 port 41286
Sep 25 00:16:02 tux-35-217 sshd\[16861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
Sep 25 00:16:04 tux-35-217 sshd\[16861\]: Failed password for invalid user admin from 162.241.193.116 port 41286 ssh2
Sep 25 00:19:47 tux-35-217 sshd\[16895\]: Invalid user zimbra from 162.241.193.116 port 54150
Sep 25 00:19:47 tux-35-217 sshd\[16895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
...
2019-09-25 07:08:14
35.187.121.255 attackspambots
5902/tcp
[2019-09-24]1pkt
2019-09-25 06:58:21
190.217.71.15 attackspam
Sep 24 22:53:28 localhost sshd\[130630\]: Invalid user administrador from 190.217.71.15 port 14237
Sep 24 22:53:28 localhost sshd\[130630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.217.71.15
Sep 24 22:53:30 localhost sshd\[130630\]: Failed password for invalid user administrador from 190.217.71.15 port 14237 ssh2
Sep 24 22:57:39 localhost sshd\[130753\]: Invalid user dw from 190.217.71.15 port 50535
Sep 24 22:57:39 localhost sshd\[130753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.217.71.15
...
2019-09-25 07:02:25
222.186.42.117 attackspam
SSH-BruteForce
2019-09-25 06:38:53
89.20.1.131 attackspambots
445/tcp
[2019-09-24]1pkt
2019-09-25 07:01:24
87.236.20.55 attackbotsspam
fail2ban honeypot
2019-09-25 07:09:37

Recently Reported IPs

245.115.90.217 40.82.71.220 146.137.164.110 205.44.207.188
96.78.112.162 91.187.2.62 146.82.17.66 197.107.124.99
8.69.193.0 13.184.83.240 236.225.158.212 80.36.199.6
57.38.239.230 250.84.193.245 141.101.13.175 35.250.53.32
230.16.89.101 73.162.108.0 133.80.172.58 118.209.221.232