Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.96.138.0 - 195.96.138.255'

% Abuse contact for '195.96.138.0 - 195.96.138.255' is 'abuse@ssdnetworks.com'

inetnum:        195.96.138.0 - 195.96.138.255
netname:        UK-SSDNETWORKS2-20211102
country:        GB
org:            ORG-SNL74-RIPE
admin-c:        SA41279-RIPE
tech-c:         SA41279-RIPE
status:         ALLOCATED PA
mnt-by:         lir-uk-ssdnetworks2-1-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-lower:      lir-uk-ssdnetworks2-1-MNT
mnt-routes:     lir-uk-ssdnetworks2-1-MNT
created:        2021-11-02T12:05:47Z
last-modified:  2021-11-02T12:05:47Z
source:         RIPE

organisation:   ORG-SNL74-RIPE
org-name:       SSD Networks Limited
country:        GB
org-type:       LIR
address:        unit4, 27 inkerman street
address:        LU1 1JB
address:        LUTON
address:        UNITED KINGDOM
phone:          +441582 614319
reg-nr:         11748354
admin-c:        SA41279-RIPE
tech-c:         SA41279-RIPE
abuse-c:        AR66001-RIPE
mnt-ref:        lir-uk-ssdnetworks2-1-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         lir-uk-ssdnetworks2-1-MNT
created:        2021-10-31T22:31:48Z
last-modified:  2026-04-29T05:40:53Z
source:         RIPE # Filtered

role:           support
address:        UNITED KINGDOM
address:        LUTON
address:        LU1 1JB
address:        unit4, 27 inkerman street
phone:          +441582 614319
nic-hdl:        SA41279-RIPE
mnt-by:         lir-uk-ssdnetworks2-1-MNT
created:        2021-10-31T22:31:47Z
last-modified:  2021-10-31T22:31:48Z
source:         RIPE # Filtered

% Information related to '195.96.138.0/24AS210924'

route:          195.96.138.0/24
origin:         AS210924
mnt-by:         lir-uk-ssdnetworks2-1-MNT
mnt-by:         mnt-uk-ssdnetworks1-1
mnt-by:         tofazzal-MNT
mnt-by:         lir-uk-ssdnetworks2-1-MNT
mnt-by:         mnt-uk-ssdnetworks1-1
mnt-by:         tofazzal-MNT
created:        2021-11-04T04:59:13Z
last-modified:  2021-11-04T04:59:13Z
source:         RIPE

% Information related to '195.96.138.0/24AS42689'

route:          195.96.138.0/24
origin:         AS42689
mnt-by:         tech-mnt
mnt-by:         lir-uk-ssdnetworks2-1-MNT
mnt-by:         mnt-uk-ssdnetworks1-1
mnt-by:         ceo-MNT
mnt-by:         tofazzal-MNT
created:        2022-01-04T23:37:11Z
last-modified:  2022-01-04T23:37:11Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.96.138.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.96.138.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026043000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 14:00:34 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 16.138.96.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.138.96.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.117.186 attackspam
$f2bV_matches
2020-07-27 07:50:21
141.98.80.54 attackspambots
Jul 27 02:03:23 mail.srvfarm.net postfix/smtps/smtpd[1616333]: warning: unknown[141.98.80.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 27 02:03:23 mail.srvfarm.net postfix/smtps/smtpd[1616333]: lost connection after AUTH from unknown[141.98.80.54]
Jul 27 02:03:29 mail.srvfarm.net postfix/smtps/smtpd[1616536]: lost connection after AUTH from unknown[141.98.80.54]
Jul 27 02:03:30 mail.srvfarm.net postfix/smtps/smtpd[1617816]: lost connection after AUTH from unknown[141.98.80.54]
Jul 27 02:03:35 mail.srvfarm.net postfix/smtps/smtpd[1617814]: lost connection after AUTH from unknown[141.98.80.54]
2020-07-27 08:20:08
206.189.83.111 attack
2020-07-26T15:12:27.483580morrigan.ad5gb.com sshd[81470]: Invalid user mc from 206.189.83.111 port 43630
2020-07-26T15:12:29.574705morrigan.ad5gb.com sshd[81470]: Failed password for invalid user mc from 206.189.83.111 port 43630 ssh2
2020-07-27 07:52:35
182.73.76.154 attackspambots
Jul 27 05:57:05 mellenthin sshd[25127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.76.154
Jul 27 05:57:07 mellenthin sshd[25127]: Failed password for invalid user info from 182.73.76.154 port 43587 ssh2
2020-07-27 12:03:25
128.199.99.204 attackbotsspam
"$f2bV_matches"
2020-07-27 08:06:45
114.67.74.50 attackbots
Invalid user dup from 114.67.74.50 port 57762
2020-07-27 07:55:57
220.130.204.78 attackspam
Unauthorised access (Jul 26) SRC=220.130.204.78 LEN=40 TTL=45 ID=60426 TCP DPT=23 WINDOW=5356 SYN
2020-07-27 08:20:54
124.156.199.234 attackbotsspam
Invalid user niraj from 124.156.199.234 port 34044
2020-07-27 07:51:17
122.52.48.92 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-07-27 08:16:43
61.56.181.162 attackbots
Unauthorised access (Jul 27) SRC=61.56.181.162 LEN=52 TTL=114 ID=5929 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-27 12:00:44
63.82.55.38 attack
E-Mail Spam (RBL) [REJECTED]
2020-07-27 08:18:41
157.55.39.114 attack
Automatic report - Banned IP Access
2020-07-27 07:51:54
51.158.118.70 attackspambots
2020-07-27T01:20:23+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-27 08:19:41
222.186.15.62 attackspambots
Jul 27 06:00:39 abendstille sshd\[20680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jul 27 06:00:41 abendstille sshd\[20680\]: Failed password for root from 222.186.15.62 port 11022 ssh2
Jul 27 06:00:43 abendstille sshd\[20680\]: Failed password for root from 222.186.15.62 port 11022 ssh2
Jul 27 06:00:45 abendstille sshd\[20680\]: Failed password for root from 222.186.15.62 port 11022 ssh2
Jul 27 06:00:48 abendstille sshd\[20908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
...
2020-07-27 12:06:59
106.52.96.247 attack
Invalid user ftpuser from 106.52.96.247 port 55172
2020-07-27 08:17:03

Recently Reported IPs

2606:4700:10::6814:9747 103.129.198.137 35.203.211.161 210.218.116.15
160.119.76.50 2606:4700:10::6816:4739 14.207.194.68 251.26.212.17
86.53.180.122 86.53.180.112 91.208.197.48 2606:4700:10::6816:3456
178.156.249.178 121.101.129.39 2606:4700:10::6816:2335 2606:4700:10::6814:9052
2606:4700:10::6814:9677 2606:4700:10::6816:2943 35.195.89.45 108.61.216.217