Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.161.16.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.161.16.70.			IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:56:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 70.16.161.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.16.161.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.131.152 attackspambots
Nov 10 06:44:27 firewall sshd[16930]: Failed password for invalid user saxon from 129.211.131.152 port 32937 ssh2
Nov 10 06:50:02 firewall sshd[17101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.131.152  user=root
Nov 10 06:50:04 firewall sshd[17101]: Failed password for root from 129.211.131.152 port 52020 ssh2
...
2019-11-10 20:12:39
212.77.147.150 attack
Chat Spam
2019-11-10 20:38:34
27.226.0.177 attackspam
Automatic report - Port Scan
2019-11-10 20:11:28
104.245.144.42 attackbotsspam
(From doretha.gerard@msn.com) Want more visitors for your website? Receive hundreds of people who are ready to buy sent directly to your website. Boost your profits fast. Start seeing results in as little as 48 hours. For additional information reply to: michael4621gre@gmail.com
2019-11-10 20:05:38
179.83.244.247 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/179.83.244.247/ 
 
 BR - 1H : (153)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN10429 
 
 IP : 179.83.244.247 
 
 CIDR : 179.83.224.0/19 
 
 PREFIX COUNT : 145 
 
 UNIQUE IP COUNT : 1862400 
 
 
 ATTACKS DETECTED ASN10429 :  
  1H - 2 
  3H - 2 
  6H - 3 
 12H - 6 
 24H - 9 
 
 DateTime : 2019-11-10 07:24:03 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-10 20:31:56
47.103.36.53 attackspam
(Nov 10)  LEN=40 TTL=45 ID=52717 TCP DPT=8080 WINDOW=3381 SYN 
 (Nov  9)  LEN=40 TTL=45 ID=15384 TCP DPT=8080 WINDOW=31033 SYN 
 (Nov  9)  LEN=40 TTL=45 ID=15227 TCP DPT=8080 WINDOW=31033 SYN 
 (Nov  9)  LEN=40 TTL=45 ID=57118 TCP DPT=8080 WINDOW=59605 SYN 
 (Nov  8)  LEN=40 TTL=45 ID=38814 TCP DPT=8080 WINDOW=15371 SYN 
 (Nov  7)  LEN=40 TTL=45 ID=17317 TCP DPT=8080 WINDOW=15371 SYN 
 (Nov  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=51569 TCP DPT=8080 WINDOW=15371 SYN 
 (Nov  6)  LEN=40 TTL=44 ID=31932 TCP DPT=8080 WINDOW=15371 SYN 
 (Nov  6)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=53817 TCP DPT=8080 WINDOW=3381 SYN 
 (Nov  6)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=4809 TCP DPT=8080 WINDOW=15371 SYN 
 (Nov  5)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=47885 TCP DPT=8080 WINDOW=31033 SYN 
 (Nov  5)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=27517 TCP DPT=8080 WINDOW=3381 SYN 
 (Nov  5)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=22050 TCP DPT=8080 WINDOW=31033 SYN 
 (Nov  5)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 I...
2019-11-10 20:02:56
76.73.206.90 attack
Nov 10 13:09:41 [munged] sshd[31513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90
2019-11-10 20:10:53
222.186.175.155 attackspam
2019-11-10T12:31:11.377717shield sshd\[30571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
2019-11-10T12:31:13.960975shield sshd\[30571\]: Failed password for root from 222.186.175.155 port 46602 ssh2
2019-11-10T12:31:17.357233shield sshd\[30571\]: Failed password for root from 222.186.175.155 port 46602 ssh2
2019-11-10T12:31:20.484452shield sshd\[30571\]: Failed password for root from 222.186.175.155 port 46602 ssh2
2019-11-10T12:31:23.369060shield sshd\[30571\]: Failed password for root from 222.186.175.155 port 46602 ssh2
2019-11-10 20:36:31
157.55.39.213 attackspambots
SQL Injection
2019-11-10 20:19:20
45.40.198.41 attackbotsspam
2019-11-10T03:24:11.914392mizuno.rwx.ovh sshd[3382305]: Connection from 45.40.198.41 port 48257 on 78.46.61.178 port 22 rdomain ""
2019-11-10T03:24:14.134343mizuno.rwx.ovh sshd[3382305]: Invalid user debian-tor from 45.40.198.41 port 48257
2019-11-10T03:24:14.142890mizuno.rwx.ovh sshd[3382305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.198.41
2019-11-10T03:24:11.914392mizuno.rwx.ovh sshd[3382305]: Connection from 45.40.198.41 port 48257 on 78.46.61.178 port 22 rdomain ""
2019-11-10T03:24:14.134343mizuno.rwx.ovh sshd[3382305]: Invalid user debian-tor from 45.40.198.41 port 48257
2019-11-10T03:24:16.174533mizuno.rwx.ovh sshd[3382305]: Failed password for invalid user debian-tor from 45.40.198.41 port 48257 ssh2
...
2019-11-10 20:22:28
31.208.74.177 attack
SSH bruteforce
2019-11-10 20:25:28
45.224.105.143 attackbots
(imapd) Failed IMAP login from 45.224.105.143 (AR/Argentina/-): 1 in the last 3600 secs
2019-11-10 19:58:19
77.123.154.234 attackspambots
2019-11-10T01:19:43.731596ns547587 sshd\[27436\]: Invalid user admin from 77.123.154.234 port 48759
2019-11-10T01:19:43.733066ns547587 sshd\[27436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.123.154.234
2019-11-10T01:19:45.561240ns547587 sshd\[27436\]: Failed password for invalid user admin from 77.123.154.234 port 48759 ssh2
2019-11-10T01:23:51.239890ns547587 sshd\[1686\]: Invalid user carty from 77.123.154.234 port 39243
...
2019-11-10 20:41:15
171.251.29.248 attack
Nov 10 12:15:41 thevastnessof sshd[14141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.251.29.248
...
2019-11-10 20:16:40
1.179.137.10 attackbotsspam
Nov  9 23:06:01 php1 sshd\[16966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10  user=root
Nov  9 23:06:03 php1 sshd\[16966\]: Failed password for root from 1.179.137.10 port 50964 ssh2
Nov  9 23:10:32 php1 sshd\[17594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10  user=root
Nov  9 23:10:35 php1 sshd\[17594\]: Failed password for root from 1.179.137.10 port 43906 ssh2
Nov  9 23:15:08 php1 sshd\[18064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10  user=root
2019-11-10 20:13:29

Recently Reported IPs

193.161.213.136 193.161.97.170 193.161.193.4 193.160.66.54
193.162.43.114 193.161.221.13 193.162.34.178 193.163.207.229
193.163.92.216 193.164.150.42 193.164.150.197 193.164.146.24
193.164.150.216 193.164.132.88 193.164.149.172 193.164.157.193
193.163.251.164 193.164.16.82 193.164.17.72 193.164.17.58