Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Helsinki

Region: Uusimaa

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
95.217.53.14 attack
Scan port
2023-02-13 19:04:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.217.53.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.217.53.139.			IN	A

;; AUTHORITY SECTION:
.			312	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 17 16:22:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
139.53.217.95.in-addr.arpa domain name pointer server.ukbdhost.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.53.217.95.in-addr.arpa	name = server.ukbdhost.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.89.194.160 attackbots
Apr 23 02:46:38 web9 sshd\[17971\]: Invalid user nh from 159.89.194.160
Apr 23 02:46:38 web9 sshd\[17971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.160
Apr 23 02:46:40 web9 sshd\[17971\]: Failed password for invalid user nh from 159.89.194.160 port 57954 ssh2
Apr 23 02:51:23 web9 sshd\[18928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.160  user=root
Apr 23 02:51:25 web9 sshd\[18928\]: Failed password for root from 159.89.194.160 port 41360 ssh2
2020-04-23 22:49:46
203.210.244.106 attack
Unauthorized connection attempt from IP address 203.210.244.106 on Port 445(SMB)
2020-04-23 23:15:24
42.115.4.38 attackspambots
Email rejected due to spam filtering
2020-04-23 22:59:55
2.87.142.76 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-23 23:09:49
78.85.32.38 attackbots
Unauthorized connection attempt from IP address 78.85.32.38 on Port 445(SMB)
2020-04-23 23:33:50
211.49.126.166 attack
Unauthorized connection attempt detected from IP address 211.49.126.166 to port 23
2020-04-23 23:31:27
130.61.118.231 attack
Apr 23 14:48:38 IngegnereFirenze sshd[6200]: Failed password for invalid user ftpuser from 130.61.118.231 port 42262 ssh2
...
2020-04-23 23:06:29
92.222.36.74 attackspam
Apr 23 16:34:25 ns382633 sshd\[6756\]: Invalid user ya from 92.222.36.74 port 32924
Apr 23 16:34:25 ns382633 sshd\[6756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.74
Apr 23 16:34:26 ns382633 sshd\[6756\]: Failed password for invalid user ya from 92.222.36.74 port 32924 ssh2
Apr 23 16:43:43 ns382633 sshd\[8646\]: Invalid user testing from 92.222.36.74 port 56534
Apr 23 16:43:43 ns382633 sshd\[8646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.74
2020-04-23 23:16:36
195.231.6.230 attackbotsspam
Apr 23 14:53:43 localhost sshd[80226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.6.230  user=root
Apr 23 14:53:45 localhost sshd[80226]: Failed password for root from 195.231.6.230 port 44720 ssh2
Apr 23 14:54:00 localhost sshd[80255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.6.230  user=root
Apr 23 14:54:03 localhost sshd[80255]: Failed password for root from 195.231.6.230 port 36892 ssh2
Apr 23 14:54:18 localhost sshd[80314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.6.230  user=root
Apr 23 14:54:20 localhost sshd[80314]: Failed password for root from 195.231.6.230 port 57384 ssh2
...
2020-04-23 22:57:29
122.176.44.163 attack
Apr 23 13:38:55 vps647732 sshd[19339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.44.163
Apr 23 13:38:57 vps647732 sshd[19339]: Failed password for invalid user ja from 122.176.44.163 port 52200 ssh2
...
2020-04-23 22:50:19
223.29.225.43 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-23 23:23:24
45.237.140.120 attack
IP blocked
2020-04-23 23:04:33
138.117.76.219 attackbots
Apr 23 14:00:47 dev0-dcde-rnet sshd[25360]: Failed password for root from 138.117.76.219 port 39158 ssh2
Apr 23 14:08:11 dev0-dcde-rnet sshd[25430]: Failed password for root from 138.117.76.219 port 52540 ssh2
2020-04-23 23:22:48
183.83.129.22 attackbots
Unauthorized connection attempt from IP address 183.83.129.22 on Port 445(SMB)
2020-04-23 23:12:20
14.191.193.211 attackbotsspam
Unauthorized connection attempt from IP address 14.191.193.211 on Port 445(SMB)
2020-04-23 23:00:12

Recently Reported IPs

95.199.20.167 96.76.134.166 97.96.188.234 98.121.252.23
190.188.181.105 98.20.215.176 99.36.107.228 99.39.148.106
194.152.74.203 10.153.246.168 10.196.197.228 100.238.85.126
100.31.108.153 217.225.53.151 101.193.56.214 101.250.208.50
102.151.24.146 114.141.132.72 96.120.95.186 114.141.132.224