IP address


.254199.195.251.168
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
Echelon SSH connection attempt
199.195.251.168 is listed on the Echelon SSH connection attempt blacklist.

Description: SSH connection attempt detected on port 22 or 2222
Type of feed: primary (feed detail page)

Last checked at: 2026-05-13 09:35:04.264000
Was present on blacklist at: 2026-05-05 09:35, 2026-05-07 09:35, 2026-05-08 09:35, 2026-05-09 09:35, 2026-05-10 09:35, 2026-05-11 09:35, 2026-05-13 09:35
Echelon SSH bruteforce
199.195.251.168 is listed on the Echelon SSH bruteforce blacklist.

Description: Multiple SSH authentication attempts detected
Type of feed: primary (feed detail page)

Last checked at: 2026-05-12 09:35:03.465000
Was present on blacklist at: 2026-05-10 09:35, 2026-05-11 09:35, 2026-05-12 09:35
AbuseIPDB
199.195.251.168 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-05-15 04:00:00.726000
Was present on blacklist at: 2026-05-15 04:00
blocklist.de SSH
199.195.251.168 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-17 22:05:05.166000
Was present on blacklist at: 2026-05-16 22:05, 2026-05-17 04:05, 2026-05-17 10:05, 2026-05-17 16:05, 2026-05-17 22:05

Threat categories

TLRoleCategoryDetails
53 src login protocol: ssh
port: 22, 2222
50 src scan
25 src

Warden events (24)
2026-05-17
AttemptLogin (node.b7f4d1): 1
2026-05-16
AttemptLogin (node.70e749): 1
2026-05-15
AttemptLogin (node.c26a5f): 1
2026-05-14
AttemptLogin (node.70e749): 2
AttemptLogin (node.eef996): 1
2026-05-13
AttemptLogin (node.03e7a9): 1
AttemptLogin (node.985fb4): 1
AttemptLogin (node.ce2b59): 2
AttemptLogin (node.b17ef8): 1
2026-05-10
AttemptLogin (node.ce2b59): 1
AttemptLogin (node.b17ef8): 1
2026-05-09
AttemptLogin (node.ce2b59): 3
AttemptLogin (node.70e749): 2
2026-05-08
AttemptLogin (node.eef996): 1
AttemptLogin (node.ce2b59): 3
AttemptLogin (node.b7f4d1): 1
2026-05-05
AttemptLogin (node.ce2b59): 1
DShield reports (IP summary, reports)
2026-05-09
Number of reports: 33
Distinct targets: 22
2026-05-10
Number of reports: 29
Distinct targets: 23
2026-05-11
Number of reports: 10
Distinct targets: 6
2026-05-14
Number of reports: 50
Distinct targets: 25
2026-05-15
Number of reports: 21
Distinct targets: 10
2026-05-16
Number of reports: 17
Distinct targets: 11
Origin AS
AS53667 - PONYNET
BGP Prefix
199.195.248.0/21
geo
United States, Staten Island
🕑 America/New_York
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
199.195.248.0 - 199.195.255.255
last_activity
2026-05-17 14:32:36.754000
last_warden_event
2026-05-17 14:32:36.754000
rep
0.2542341457607089
reserved_range
0
Shodan's InternetDB
Open ports: 22, 443, 25000, 25001, 25005, 25006, 25007, 25009, 25010
Tags:
CPEs: cpe:/a:openbsd:openssh:9.6p1, cpe:/a:apache:traffic_server, cpe:/o:canonical:ubuntu_linux
ts_added
2026-05-05 03:19:49.971000
ts_last_update
2026-05-17 22:08:20.649000

Warden event timeline

DShield event timeline

Presence on blacklists