Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.94.49.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.94.49.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 18:38:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
169.49.94.83.in-addr.arpa domain name pointer 83-94-49-169-cable.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.49.94.83.in-addr.arpa	name = 83-94-49-169-cable.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
179.33.137.117 attackbots
Nov 21 21:16:03 pornomens sshd\[8918\]: Invalid user yesenia from 179.33.137.117 port 45152
Nov 21 21:16:03 pornomens sshd\[8918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117
Nov 21 21:16:05 pornomens sshd\[8918\]: Failed password for invalid user yesenia from 179.33.137.117 port 45152 ssh2
...
2019-11-22 06:08:59
177.107.193.254 attack
Unauthorized connection attempt from IP address 177.107.193.254 on Port 445(SMB)
2019-11-22 06:25:13
45.227.253.211 attack
Nov 21 23:02:04 relay postfix/smtpd\[16353\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 23:07:20 relay postfix/smtpd\[16352\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 23:07:27 relay postfix/smtpd\[28089\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 23:13:09 relay postfix/smtpd\[28571\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 23:13:16 relay postfix/smtpd\[18946\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-22 06:13:34
125.124.152.59 attackspam
Nov 21 21:13:18 server sshd\[5959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.152.59  user=vcsa
Nov 21 21:13:20 server sshd\[5959\]: Failed password for vcsa from 125.124.152.59 port 58494 ssh2
Nov 21 21:25:41 server sshd\[9154\]: Invalid user svingen from 125.124.152.59
Nov 21 21:25:41 server sshd\[9154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.152.59 
Nov 21 21:25:43 server sshd\[9154\]: Failed password for invalid user svingen from 125.124.152.59 port 49162 ssh2
...
2019-11-22 06:28:16
177.106.49.213 attackbotsspam
Unauthorized connection attempt from IP address 177.106.49.213 on Port 445(SMB)
2019-11-22 06:42:49
112.17.166.159 attack
Automatic report - Port Scan Attack
2019-11-22 06:10:42
146.185.175.132 attackbots
Nov 21 22:55:54 pornomens sshd\[9796\]: Invalid user flavia from 146.185.175.132 port 37558
Nov 21 22:55:54 pornomens sshd\[9796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.175.132
Nov 21 22:55:56 pornomens sshd\[9796\]: Failed password for invalid user flavia from 146.185.175.132 port 37558 ssh2
...
2019-11-22 06:41:24
85.192.72.238 attackbots
Invalid user lothe from 85.192.72.238 port 1125
2019-11-22 06:12:26
27.75.44.107 attackspam
Unauthorized connection attempt from IP address 27.75.44.107 on Port 445(SMB)
2019-11-22 06:32:15
144.76.220.101 attackspambots
Automatic report - XMLRPC Attack
2019-11-22 06:08:05
131.72.222.167 attack
Unauthorized connection attempt from IP address 131.72.222.167 on Port 445(SMB)
2019-11-22 06:37:01
112.121.163.11 attack
112.121.163.11 was recorded 5 times by 5 hosts attempting to connect to the following ports: 8933,9833. Incident counter (4h, 24h, all-time): 5, 60, 920
2019-11-22 06:39:23
148.56.100.232 attackbotsspam
Unauthorized connection attempt from IP address 148.56.100.232 on Port 445(SMB)
2019-11-22 06:44:33
77.247.110.58 attackspam
11/21/2019-17:01:52.252500 77.247.110.58 Protocol: 17 ET SCAN Sipvicious Scan
2019-11-22 06:07:23
61.45.37.148 attackbots
Automatic report - Banned IP Access
2019-11-22 06:43:29

Recently Reported IPs

53.236.47.105 200.237.111.183 157.204.139.56 19.90.124.156
29.39.216.213 185.92.62.217 188.229.162.223 55.72.251.118
221.234.154.200 64.64.25.64 124.128.195.175 202.97.130.202
175.82.6.139 242.128.42.10 44.3.11.192 79.171.58.95
36.154.233.83 117.234.74.121 46.7.239.227 98.229.90.254