Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Moscow

Region: Moscow (City)

Country: Russia

Internet Service Provider: MegaFon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.63.216.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.63.216.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025040100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 01 21:17:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 48.216.63.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.216.63.109.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.74 attack
2019-08-28T12:27:36.865387abusebot-3.cloudsearch.cf sshd\[29823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.74  user=root
2019-08-28 20:41:23
178.128.156.144 attackspambots
Invalid user apache from 178.128.156.144 port 47780
2019-08-28 20:40:33
165.227.94.64 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-08-28 20:44:17
91.121.157.83 attackspam
Invalid user mj from 91.121.157.83 port 46686
2019-08-28 21:16:56
210.56.28.219 attackbots
Aug 27 20:44:47 hanapaa sshd\[17751\]: Invalid user asalyers from 210.56.28.219
Aug 27 20:44:47 hanapaa sshd\[17751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.28.219
Aug 27 20:44:49 hanapaa sshd\[17751\]: Failed password for invalid user asalyers from 210.56.28.219 port 51930 ssh2
Aug 27 20:49:58 hanapaa sshd\[18253\]: Invalid user vispi from 210.56.28.219
Aug 27 20:49:58 hanapaa sshd\[18253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.28.219
2019-08-28 21:12:47
188.213.165.189 attack
Aug 27 20:31:02 hcbb sshd\[1566\]: Invalid user trafficcng from 188.213.165.189
Aug 27 20:31:02 hcbb sshd\[1566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.165.189
Aug 27 20:31:04 hcbb sshd\[1566\]: Failed password for invalid user trafficcng from 188.213.165.189 port 58014 ssh2
Aug 27 20:35:58 hcbb sshd\[2006\]: Invalid user firewall from 188.213.165.189
Aug 27 20:35:58 hcbb sshd\[2006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.165.189
2019-08-28 21:06:31
94.23.58.119 attack
Automatic report - Banned IP Access
2019-08-28 21:11:28
111.75.199.85 attackbotsspam
Invalid user test2 from 111.75.199.85 port 36761
2019-08-28 20:58:31
51.79.68.32 attack
Invalid user corinna from 51.79.68.32 port 34930
2019-08-28 20:48:05
51.68.82.218 attackspambots
$f2bV_matches
2019-08-28 20:33:56
62.234.156.120 attack
Invalid user niclas from 62.234.156.120 port 51335
2019-08-28 21:01:45
177.138.223.207 attackbotsspam
Automatic report - Port Scan Attack
2019-08-28 21:05:10
192.34.58.171 attackbots
Aug 28 19:13:10 itv-usvr-01 sshd[1488]: Invalid user mktg1 from 192.34.58.171
Aug 28 19:13:14 itv-usvr-01 sshd[1488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.58.171
Aug 28 19:13:10 itv-usvr-01 sshd[1488]: Invalid user mktg1 from 192.34.58.171
Aug 28 19:13:16 itv-usvr-01 sshd[1488]: Failed password for invalid user mktg1 from 192.34.58.171 port 42414 ssh2
2019-08-28 21:08:31
14.49.38.114 attackspambots
$f2bV_matches
2019-08-28 21:10:00
84.113.99.164 attackbots
SSH Bruteforce
2019-08-28 21:03:22

Recently Reported IPs

221.52.234.143 73.21.105.205 214.216.214.37 37.127.6.212
4.47.15.50 4.105.115.251 242.181.118.104 224.159.64.122
202.51.48.159 87.164.192.72 67.181.182.39 226.142.89.131
168.1.250.106 194.197.174.67 246.227.153.82 63.195.176.176
199.34.234.212 2.23.203.62 159.2.169.246 3.209.3.11