Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Las Palmas de Gran Canaria

Region: Canary Islands

Country: Spain

Internet Service Provider: Ayuntamiento de Las Palmas

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt from IP address 195.57.239.11 on Port 445(SMB)
2020-10-11 03:25:33
attack
Unauthorized connection attempt from IP address 195.57.239.11 on Port 445(SMB)
2020-10-10 19:16:16
attackspambots
Unauthorized connection attempt from IP address 195.57.239.11 on Port 445(SMB)
2020-06-10 21:47:01
attackspam
20/4/5@09:41:59: FAIL: Alarm-Network address from=195.57.239.11
20/4/5@09:42:00: FAIL: Alarm-Network address from=195.57.239.11
...
2020-04-06 05:21:59
attackspambots
Unauthorised access (Dec  9) SRC=195.57.239.11 LEN=52 TTL=112 ID=17223 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-10 04:21:23
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.57.239.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30227
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.57.239.11.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051001 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat May 11 04:15:54 +08 2019
;; MSG SIZE  rcvd: 117

Host info
11.239.57.195.in-addr.arpa is an alias for 11.0.239.57.195.in-addr.arpa.
11.0.239.57.195.in-addr.arpa domain name pointer 11.red-195-57-239.customer.static.ccgg.telefonica.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
11.239.57.195.in-addr.arpa	canonical name = 11.0.239.57.195.in-addr.arpa.
11.0.239.57.195.in-addr.arpa	name = 11.red-195-57-239.customer.static.ccgg.telefonica.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
200.116.105.213 attackbots
Jan  3 09:29:45 powerpi2 sshd[13908]: Invalid user vps from 200.116.105.213 port 44086
Jan  3 09:29:47 powerpi2 sshd[13908]: Failed password for invalid user vps from 200.116.105.213 port 44086 ssh2
Jan  3 09:31:50 powerpi2 sshd[14023]: Invalid user mysql from 200.116.105.213 port 60388
...
2020-01-03 19:41:17
162.243.61.72 attackbotsspam
Jan  3 09:30:19 vmd17057 sshd\[29168\]: Invalid user admin from 162.243.61.72 port 55988
Jan  3 09:30:19 vmd17057 sshd\[29168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.61.72
Jan  3 09:30:21 vmd17057 sshd\[29168\]: Failed password for invalid user admin from 162.243.61.72 port 55988 ssh2
...
2020-01-03 19:53:07
14.169.234.85 attack
Unauthorized connection attempt from IP address 14.169.234.85 on Port 445(SMB)
2020-01-03 19:23:37
112.207.45.193 attackspam
Unauthorized connection attempt from IP address 112.207.45.193 on Port 445(SMB)
2020-01-03 19:36:49
197.246.175.27 attackspam
port scan and connect, tcp 23 (telnet)
2020-01-03 19:52:23
193.192.97.154 attackspambots
Jan  3 05:45:30 vpn01 sshd[23964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.192.97.154
Jan  3 05:45:32 vpn01 sshd[23964]: Failed password for invalid user gy from 193.192.97.154 port 43838 ssh2
...
2020-01-03 19:21:52
106.54.141.45 attackspambots
Jan  3 10:22:55 MK-Soft-VM6 sshd[29352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45 
Jan  3 10:22:57 MK-Soft-VM6 sshd[29352]: Failed password for invalid user dhb from 106.54.141.45 port 47892 ssh2
...
2020-01-03 19:21:09
49.234.205.111 attack
Unauthorized connection attempt detected from IP address 49.234.205.111 to port 80
2020-01-03 19:45:47
117.62.229.128 attackbotsspam
leo_www
2020-01-03 19:48:36
88.225.219.121 attack
Unauthorized connection attempt detected from IP address 88.225.219.121 to port 23
2020-01-03 19:36:17
159.65.30.66 attackbots
Jan  3 12:21:05 v22018076622670303 sshd\[6581\]: Invalid user webmaster from 159.65.30.66 port 46276
Jan  3 12:21:05 v22018076622670303 sshd\[6581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66
Jan  3 12:21:07 v22018076622670303 sshd\[6581\]: Failed password for invalid user webmaster from 159.65.30.66 port 46276 ssh2
...
2020-01-03 20:00:09
106.13.233.102 attackbotsspam
Invalid user ukumori from 106.13.233.102 port 45760
2020-01-03 19:58:37
117.4.32.116 attack
Unauthorized connection attempt from IP address 117.4.32.116 on Port 445(SMB)
2020-01-03 19:24:13
93.65.38.77 attackspambots
Automatic report - Banned IP Access
2020-01-03 19:28:25
94.102.52.44 attackspambots
Jan  3 11:36:45 debian-2gb-nbg1-2 kernel: \[307132.764548\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.52.44 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=62889 PROTO=TCP SPT=53915 DPT=8989 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-03 19:25:19

Recently Reported IPs

164.132.49.140 115.159.225.195 93.150.16.31 184.175.121.193
46.35.192.129 212.237.41.7 180.118.86.44 176.58.100.87
106.75.176.189 179.106.107.118 188.92.209.145 139.162.182.253
250.61.195.242 192.99.225.171 45.35.169.148 66.249.64.112
121.58.206.131 94.53.95.26 200.87.239.156 181.111.226.131