Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.63.106.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.63.106.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 23:53:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
48.106.63.16.in-addr.arpa domain name pointer ec2-16-63-106-48.eu-central-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.106.63.16.in-addr.arpa	name = ec2-16-63-106-48.eu-central-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.66.221.183 attack
Automatic report - Port Scan Attack
2019-10-03 09:03:29
195.159.103.189 attackbots
2019-10-03T01:19:44.158978shield sshd\[21567\]: Invalid user log-in from 195.159.103.189 port 41020
2019-10-03T01:19:44.162527shield sshd\[21567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-159-103-189.customer.powertech.no
2019-10-03T01:19:46.539214shield sshd\[21567\]: Failed password for invalid user log-in from 195.159.103.189 port 41020 ssh2
2019-10-03T01:25:29.259740shield sshd\[22589\]: Invalid user raspberry from 195.159.103.189 port 54004
2019-10-03T01:25:29.264202shield sshd\[22589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-159-103-189.customer.powertech.no
2019-10-03 09:29:17
58.1.134.41 attackbots
Oct  2 14:57:06 php1 sshd\[32637\]: Invalid user norberto from 58.1.134.41
Oct  2 14:57:06 php1 sshd\[32637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.1.134.41
Oct  2 14:57:09 php1 sshd\[32637\]: Failed password for invalid user norberto from 58.1.134.41 port 52311 ssh2
Oct  2 15:01:44 php1 sshd\[612\]: Invalid user vy from 58.1.134.41
Oct  2 15:01:44 php1 sshd\[612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.1.134.41
2019-10-03 09:18:20
113.172.169.189 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/113.172.169.189/ 
 VN - 1H : (356)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VN 
 NAME ASN : ASN45899 
 
 IP : 113.172.169.189 
 
 CIDR : 113.172.160.0/19 
 
 PREFIX COUNT : 2411 
 
 UNIQUE IP COUNT : 7209216 
 
 
 WYKRYTE ATAKI Z ASN45899 :  
  1H - 11 
  3H - 42 
  6H - 88 
 12H - 100 
 24H - 170 
 
 DateTime : 2019-10-02 23:24:01 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-03 09:35:09
222.186.42.4 attackspam
SSH-BruteForce
2019-10-03 09:21:05
37.187.79.55 attackbotsspam
Oct  3 02:57:05 core sshd[17490]: Invalid user maddi from 37.187.79.55 port 41251
Oct  3 02:57:08 core sshd[17490]: Failed password for invalid user maddi from 37.187.79.55 port 41251 ssh2
...
2019-10-03 09:07:15
184.88.251.241 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/184.88.251.241/ 
 US - 1H : (1405)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN33363 
 
 IP : 184.88.251.241 
 
 CIDR : 184.88.0.0/14 
 
 PREFIX COUNT : 752 
 
 UNIQUE IP COUNT : 6006528 
 
 
 WYKRYTE ATAKI Z ASN33363 :  
  1H - 3 
  3H - 8 
  6H - 16 
 12H - 22 
 24H - 34 
 
 DateTime : 2019-10-02 23:24:01 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-03 09:36:44
37.59.37.69 attackspam
2019-10-02T21:57:11.194472abusebot-7.cloudsearch.cf sshd\[8113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns330008.ip-37-59-37.eu  user=root
2019-10-03 09:20:49
177.25.157.229 attackspambots
Invalid user ubnt from 177.25.157.229 port 43837
2019-10-03 08:53:04
119.27.170.64 attack
Oct  3 01:29:52 jane sshd[22662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.170.64 
Oct  3 01:29:54 jane sshd[22662]: Failed password for invalid user 123postmaster from 119.27.170.64 port 44010 ssh2
...
2019-10-03 09:06:11
41.242.102.66 attackspam
Oct  3 05:49:19 gw1 sshd[5424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.242.102.66
Oct  3 05:49:21 gw1 sshd[5424]: Failed password for invalid user teresa from 41.242.102.66 port 35782 ssh2
...
2019-10-03 09:04:59
123.20.167.25 attack
Oct  2 23:24:13 dev sshd\[26863\]: Invalid user admin from 123.20.167.25 port 43698
Oct  2 23:24:13 dev sshd\[26863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.20.167.25
Oct  2 23:24:15 dev sshd\[26863\]: Failed password for invalid user admin from 123.20.167.25 port 43698 ssh2
2019-10-03 09:30:21
50.62.176.78 attackbots
Automatic report - XMLRPC Attack
2019-10-03 09:06:34
158.69.41.225 attack
scan r
2019-10-03 08:54:19
79.137.72.40 attackbots
Oct  3 01:28:19 lnxded64 sshd[12246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.40
2019-10-03 09:05:19

Recently Reported IPs

255.201.33.92 188.181.79.194 41.217.51.14 194.49.23.65
143.250.213.77 23.187.6.41 144.183.3.137 234.134.9.255
126.26.20.119 87.49.244.184 22.154.16.7 133.98.32.181
38.149.103.220 12.179.71.237 82.157.192.115 206.72.179.163
139.80.102.234 253.233.122.208 171.5.246.69 77.85.1.223