Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
199.195.252.122 attack
Scan port
2023-09-13 12:25:59
199.195.252.209 attackspambots
*Port Scan* detected from 199.195.252.209 (US/United States/-). 11 hits in the last 110 seconds; Ports: *; Direction: in; Trigger: PS_LIMIT
2020-10-09 02:05:01
199.195.252.209 attackbots
Oct 8 04:11:13 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=199.195.252.209 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=11610 PROTO=TCP SPT=43070 DPT=8089 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 8 04:11:25 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=199.195.252.209 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=31460 PROTO=TCP SPT=43070 DPT=7070 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 8 04:11:27 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=199.195.252.209 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=3869 PROTO=TCP SPT=43070 DPT=21071 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 8 04:11:53 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=199.195.252.209 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=64468 PROTO=TCP SPT=43070 DPT=2080 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 8 04:12:20 *hidden* 
...
2020-10-08 18:01:44
199.195.252.245 attack
Tor exit node
2020-05-28 06:32:46
199.195.252.209 attackspambots
port scans on irc network
2020-05-06 21:42:02
199.195.252.213 attackspam
Apr 18 04:57:53 web8 sshd\[4978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213  user=root
Apr 18 04:57:54 web8 sshd\[4978\]: Failed password for root from 199.195.252.213 port 44526 ssh2
Apr 18 05:01:47 web8 sshd\[7042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213  user=root
Apr 18 05:01:49 web8 sshd\[7042\]: Failed password for root from 199.195.252.213 port 56524 ssh2
Apr 18 05:05:31 web8 sshd\[9109\]: Invalid user admin from 199.195.252.213
Apr 18 05:05:31 web8 sshd\[9109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
2020-04-18 15:54:46
199.195.252.213 attack
Invalid user juan from 199.195.252.213 port 60680
2020-03-22 04:12:04
199.195.252.213 attackspam
Mar 17 22:58:04 sigma sshd\[29428\]: Invalid user kafka from 199.195.252.213Mar 17 22:58:07 sigma sshd\[29428\]: Failed password for invalid user kafka from 199.195.252.213 port 43128 ssh2
...
2020-03-18 08:54:19
199.195.252.213 attackbots
Feb  8 07:16:55 silence02 sshd[9739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
Feb  8 07:16:56 silence02 sshd[9739]: Failed password for invalid user sek from 199.195.252.213 port 51890 ssh2
Feb  8 07:19:56 silence02 sshd[9915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
2020-02-08 19:49:53
199.195.252.209 attackbots
slow and persistent scanner
2020-02-01 10:33:44
199.195.252.213 attackbotsspam
2020-01-26T08:38:46.975851abusebot-3.cloudsearch.cf sshd[18490]: Invalid user docs from 199.195.252.213 port 50172
2020-01-26T08:38:46.990756abusebot-3.cloudsearch.cf sshd[18490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
2020-01-26T08:38:46.975851abusebot-3.cloudsearch.cf sshd[18490]: Invalid user docs from 199.195.252.213 port 50172
2020-01-26T08:38:49.071593abusebot-3.cloudsearch.cf sshd[18490]: Failed password for invalid user docs from 199.195.252.213 port 50172 ssh2
2020-01-26T08:40:29.877749abusebot-3.cloudsearch.cf sshd[18581]: Invalid user telekom from 199.195.252.213 port 39684
2020-01-26T08:40:29.884341abusebot-3.cloudsearch.cf sshd[18581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
2020-01-26T08:40:29.877749abusebot-3.cloudsearch.cf sshd[18581]: Invalid user telekom from 199.195.252.213 port 39684
2020-01-26T08:40:32.437089abusebot-3.cloudsearch.cf sshd
...
2020-01-26 16:41:19
199.195.252.213 attackbots
Unauthorized connection attempt detected from IP address 199.195.252.213 to port 2220 [J]
2020-01-15 14:03:29
199.195.252.213 attackbots
Invalid user nqa from 199.195.252.213 port 41858
2020-01-10 22:02:19
199.195.252.213 attackspambots
Jan 10 08:24:24 hosting180 sshd[14165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213  user=root
Jan 10 08:24:27 hosting180 sshd[14165]: Failed password for root from 199.195.252.213 port 54404 ssh2
...
2020-01-10 16:15:12
199.195.252.213 attack
Unauthorized connection attempt detected from IP address 199.195.252.213 to port 2220 [J]
2020-01-06 13:39:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.195.252.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.195.252.114.		IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 07:44:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
114.252.195.199.in-addr.arpa domain name pointer box.enene.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.252.195.199.in-addr.arpa	name = box.enene.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.17 attackspambots
Jul  6 04:07:56 ny01 sshd[8086]: Failed password for root from 222.186.190.17 port 50666 ssh2
Jul  6 04:11:05 ny01 sshd[8481]: Failed password for root from 222.186.190.17 port 43973 ssh2
2020-07-06 16:17:50
72.221.196.135 attackspambots
Autoban   72.221.196.135 ABORTED AUTH
2020-07-06 16:06:23
180.191.84.203 attack
Jul  6 05:51:29 vmd48417 sshd[5684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.191.84.203
2020-07-06 15:43:12
47.107.186.183 attack
Automatic report - Banned IP Access
2020-07-06 15:56:50
103.56.43.229 attackbotsspam
Jul  6 01:15:34 raspberrypi sshd[16868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.43.229 
Jul  6 01:15:36 raspberrypi sshd[16868]: Failed password for invalid user web from 103.56.43.229 port 55438 ssh2
Jul  6 01:22:52 raspberrypi sshd[17031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.43.229 
...
2020-07-06 15:54:30
198.199.83.174 attackspambots
Jul  6 07:14:08 lnxweb62 sshd[420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.83.174
2020-07-06 16:01:12
122.51.101.136 attackspam
Port Scan
2020-07-06 16:07:17
14.2.78.72 attackbots
Email rejected due to spam filtering
2020-07-06 15:57:51
106.13.144.8 attack
Jul  6 09:37:14 lnxded64 sshd[12943]: Failed password for root from 106.13.144.8 port 45766 ssh2
Jul  6 09:37:14 lnxded64 sshd[12943]: Failed password for root from 106.13.144.8 port 45766 ssh2
2020-07-06 15:39:34
118.70.176.140 attackspambots
1594007490 - 07/06/2020 05:51:30 Host: 118.70.176.140/118.70.176.140 Port: 445 TCP Blocked
2020-07-06 15:41:41
83.97.20.31 attackbotsspam
 TCP (SYN) 83.97.20.31:42665 -> port 21, len 44
2020-07-06 16:05:52
165.22.63.225 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-06 16:19:45
212.34.158.113 attackbotsspam
SSH Scan
2020-07-06 16:04:09
80.82.65.74 attackspam
firewall-block, port(s): 7009/tcp, 35493/tcp
2020-07-06 15:51:09
86.57.26.195 attack
07/06/2020-03:20:08.936346 86.57.26.195 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-06 15:45:56

Recently Reported IPs

58.56.182.46 209.141.49.52 66.249.73.191 209.97.176.122
20.242.2.0 88.208.241.149 128.90.145.199 128.90.115.115
87.123.117.240 128.90.113.177 128.90.115.6 128.90.119.148
128.90.107.113 176.57.68.35 185.164.75.118 188.16.86.118
186.205.65.251 180.107.225.175 103.176.21.200 14.207.84.21