Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Islington

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '163.167.0.0 - 163.167.255.255'

% No abuse contact registered for 163.167.0.0 - 163.167.255.255

inetnum:        163.167.0.0 - 163.167.255.255
remarks:        netname: LONDONMET
descr:          London Metropolitan University
descr:          Holloway Road, London N7 8DB
remarks:        country: GB
admin-c:        GP8102-RIPE
tech-c:         GP8102-RIPE
remarks:        changed: hostmaster@londonmet.ac.uk 20070914
netname:        LONDONMET
descr:          London Metropolitan University
country:        GB
mnt-by:         LONDONMET-MNT
mnt-routes:     LONDONMET-MNT
mnt-domains:    LONDONMET-MNT
status:         LEGACY
created:        2003-04-16T12:30:04Z
last-modified:  2015-05-05T01:45:37Z
source:         RIPE

person:         Godfrey Peart
mnt-by:         Godfrey-Peart
address:        London Metropolitan University 166-220 Holloway Rd, London
phone:          +44 7133 4511
fax-no:         +44 7133 4511
nic-hdl:        GP8102-RIPE
remarks:        Senior Network Analyst, Londonmet University
created:        2007-07-04T11:00:52Z
last-modified:  2014-04-08T10:24:50Z
source:         RIPE

% Information related to '163.167.0.0/16AS786'

route:          163.167.0.0/16
descr:          University of North London
descr:          166-220 Holloway Road
descr:          London
descr:          England
descr:          N7 8DB
descr:          UNITED KINGDOM
origin:         AS786
mnt-by:         JIPS-NOSC
created:        1970-01-01T00:00:00Z
last-modified:  2001-09-22T09:32:02Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.167.118.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.167.118.63.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 22:56:09 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 63.118.167.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.118.167.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.89.125.114 attack
SIP Server BruteForce Attack
2019-10-27 06:55:15
114.35.124.245 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:13:07
195.34.97.125 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:01:02
66.240.219.146 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 62 - port: 8809 proto: TCP cat: Misc Attack
2019-10-27 06:54:30
210.140.10.53 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:32:26
159.203.201.210 attackspam
Port scan: Attack repeated for 24 hours
2019-10-27 07:10:48
67.205.170.119 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 63 - port: 60089 proto: TCP cat: Misc Attack
2019-10-27 07:25:38
60.8.180.8 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 53 - port: 1433 proto: TCP cat: Misc Attack
2019-10-27 07:27:21
92.118.37.70 attackbotsspam
Multiport scan : 6 ports scanned 3388 3390 3391 3392 3393 33890
2019-10-27 07:16:50
37.49.231.121 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 24 - port: 69 proto: UDP cat: Misc Attack
2019-10-27 06:56:56
94.102.51.108 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 95 - port: 3389 proto: TCP cat: Misc Attack
2019-10-27 07:15:29
159.203.201.81 attackbotsspam
ET SCAN Suspicious inbound to mSQL port 4333 - port: 4333 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:11:58
60.191.82.92 attackbots
ET COMPROMISED Known Compromised or Hostile Host Traffic group 15 - port: 8050 proto: TCP cat: Misc Attack
2019-10-27 07:26:54
185.216.140.6 attackbots
10/26/2019-17:04:58.504769 185.216.140.6 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 07:03:33
31.184.215.238 attackspam
10/26/2019-17:02:43.566345 31.184.215.238 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 21
2019-10-27 06:58:15

Recently Reported IPs

102.215.13.26 103.189.249.212 2606:4700:10::ac43:1167 2606:4700:10::ac43:2637
2606:4700:10::6816:846 2606:4700:10::6816:2201 2606:4700:10::6814:7744 2606:4700:10::6814:8413
2606:4700:10::6814:5473 2606:4700:10::6816:1688 189.223.105.56 204.244.88.209
224.121.3.72 3.85.49.138 133.106.125.10 110.77.226.227
2606:4700:10::6816:3211 2606:4700:10::6814:7493 2606:4700:10::6814:5910 2606:4700:10::6814:9621