Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.47.47.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.47.47.195.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101900 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 19 17:54:23 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 195.47.47.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.47.47.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.10.28 attackspam
Jun 13 07:05:53 hosting sshd[22007]: Invalid user omikawa from 182.61.10.28 port 40094
...
2020-06-13 19:56:00
122.200.93.71 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-06-13 19:33:31
182.122.23.141 attackbots
Jun 12 20:14:38 v2hgb sshd[9860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.23.141  user=r.r
Jun 12 20:14:39 v2hgb sshd[9860]: Failed password for r.r from 182.122.23.141 port 23512 ssh2
Jun 12 20:14:41 v2hgb sshd[9860]: Received disconnect from 182.122.23.141 port 23512:11: Bye Bye [preauth]
Jun 12 20:14:41 v2hgb sshd[9860]: Disconnected from authenticating user r.r 182.122.23.141 port 23512 [preauth]
Jun 12 20:15:37 v2hgb sshd[9915]: Invalid user user from 182.122.23.141 port 38902
Jun 12 20:15:37 v2hgb sshd[9915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.23.141 
Jun 12 20:15:39 v2hgb sshd[9915]: Failed password for invalid user user from 182.122.23.141 port 38902 ssh2
Jun 12 20:15:40 v2hgb sshd[9915]: Received disconnect from 182.122.23.141 port 38902:11: Bye Bye [preauth]
Jun 12 20:15:40 v2hgb sshd[9915]: Disconnected from invalid user user 182.122.23.141 por........
-------------------------------
2020-06-13 20:00:01
91.233.42.38 attackbots
Invalid user user1 from 91.233.42.38 port 53568
2020-06-13 20:08:11
191.235.73.252 attackspam
Jun 13 10:54:58 meumeu sshd[396691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.73.252  user=root
Jun 13 10:55:00 meumeu sshd[396691]: Failed password for root from 191.235.73.252 port 44654 ssh2
Jun 13 10:56:44 meumeu sshd[396751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.73.252  user=root
Jun 13 10:56:46 meumeu sshd[396751]: Failed password for root from 191.235.73.252 port 37876 ssh2
Jun 13 10:58:36 meumeu sshd[396822]: Invalid user rexmen from 191.235.73.252 port 59354
Jun 13 10:58:36 meumeu sshd[396822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.73.252 
Jun 13 10:58:36 meumeu sshd[396822]: Invalid user rexmen from 191.235.73.252 port 59354
Jun 13 10:58:38 meumeu sshd[396822]: Failed password for invalid user rexmen from 191.235.73.252 port 59354 ssh2
Jun 13 11:00:27 meumeu sshd[396892]: Invalid user admin from 191.235.73.252 port 52602
...
2020-06-13 19:32:41
59.60.209.12 attackspam
Jun 13 12:12:49 ns382633 sshd\[32449\]: Invalid user Fabu from 59.60.209.12 port 45506
Jun 13 12:12:49 ns382633 sshd\[32449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.60.209.12
Jun 13 12:12:52 ns382633 sshd\[32449\]: Failed password for invalid user Fabu from 59.60.209.12 port 45506 ssh2
Jun 13 12:27:53 ns382633 sshd\[2720\]: Invalid user admin from 59.60.209.12 port 58192
Jun 13 12:27:53 ns382633 sshd\[2720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.60.209.12
2020-06-13 20:08:40
218.29.54.87 attack
Invalid user ftpznz from 218.29.54.87 port 42051
2020-06-13 19:41:24
49.234.39.194 attackbotsspam
2020-06-13T05:51:09.209999upcloud.m0sh1x2.com sshd[15647]: Invalid user cid from 49.234.39.194 port 39856
2020-06-13 19:43:16
52.231.54.157 attackspambots
Jun 13 10:43:21 vpn01 sshd[14981]: Failed password for root from 52.231.54.157 port 49950 ssh2
...
2020-06-13 19:45:48
222.186.175.217 attackspambots
2020-06-13T11:37:40.291743shield sshd\[3194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
2020-06-13T11:37:42.209151shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13T11:37:45.441421shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13T11:37:48.418313shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13T11:37:51.806667shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13 19:43:46
188.131.178.32 attackspam
Jun 12 23:35:47 propaganda sshd[10465]: Connection from 188.131.178.32 port 60002 on 10.0.0.160 port 22 rdomain ""
Jun 12 23:35:50 propaganda sshd[10465]: Connection closed by 188.131.178.32 port 60002 [preauth]
2020-06-13 20:04:10
136.49.109.217 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-06-13 19:49:35
103.66.16.18 attackbots
SSH brutforce
2020-06-13 19:59:08
213.37.40.162 attackspam
Jun 13 12:15:16 vserver sshd\[20380\]: Invalid user asterisk from 213.37.40.162Jun 13 12:15:18 vserver sshd\[20380\]: Failed password for invalid user asterisk from 213.37.40.162 port 37522 ssh2Jun 13 12:18:43 vserver sshd\[20403\]: Failed password for root from 213.37.40.162 port 38632 ssh2Jun 13 12:22:07 vserver sshd\[20419\]: Failed password for root from 213.37.40.162 port 39728 ssh2
...
2020-06-13 20:07:55
61.177.172.128 attack
detected by Fail2Ban
2020-06-13 19:29:31

Recently Reported IPs

124.131.169.46 50.28.224.16 198.71.240.4 168.232.131.53
5.202.192.146 89.118.250.168 178.62.75.60 16.152.185.68
209.0.224.33 198.97.31.132 118.104.73.253 10.241.105.164
137.3.90.14 119.212.128.217 182.230.151.254 215.70.164.114
1.104.119.107 140.216.105.85 76.44.232.193 88.169.8.129