IP address


.011199.195.249.83
Shodan(more info)
Passive DNS
Tags:
IP blacklists
Echelon SSH connection attempt
199.195.249.83 is listed on the Echelon SSH connection attempt blacklist.

Description: SSH connection attempt detected on port 22 or 2222
Type of feed: primary (feed detail page)

Last checked at: 2026-05-13 09:35:04.264000
Was present on blacklist at: 2026-05-05 09:35, 2026-05-07 09:35, 2026-05-08 09:35, 2026-05-09 09:35, 2026-05-10 09:35, 2026-05-11 09:35, 2026-05-13 09:35

Threat categories

TLRoleCategoryDetails
50 src scan
44 src login protocol: ssh
port: 22, 2222

Warden events (7)
2026-05-13
AttemptLogin (node.ce2b59): 1
2026-05-12
AttemptLogin (node.ce2b59): 4
2026-05-11
AttemptLogin (node.ce2b59): 1
2026-05-09
AttemptLogin (node.ce2b59): 1
DShield reports (IP summary, reports)
2026-05-12
Number of reports: 10
Distinct targets: 7
2026-05-13
Number of reports: 25
Distinct targets: 15
Origin AS
AS53667 - PONYNET
BGP Prefix
199.195.248.0/21
geo
United States, Staten Island
🕑 America/New_York
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
199.195.248.0 - 199.195.255.255
last_activity
2026-05-13 01:01:17
last_warden_event
2026-05-13 01:01:17
rep
0.01060932852831209
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80, 81, 443, 3000, 5244, 8008, 8095, 8096, 8443, 9050
Tags: eol-product
CPEs: cpe:/a:portainer:portainer:2.16.2, cpe:/a:openresty:openresty, cpe:/a:f5:nginx, cpe:/a:angularjs:angular.js, cpe:/o:canonical:ubuntu_linux, cpe:/a:getbootstrap:bootstrap:3.4.1, cpe:/a:emby:emby.releases:4.9.1.90, cpe:/a:openbsd:openssh:9.6p1, cpe:/a:f5:nginx:1.22.1
ts_added
2026-05-05 09:35:08.174000
ts_last_update
2026-05-17 09:35:10.194000

Warden event timeline

DShield event timeline

Presence on blacklists