Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.159.97.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.159.97.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:19:43 CST 2025
;; MSG SIZE  rcvd: 106
Host info
164.97.159.94.in-addr.arpa domain name pointer 23406.h2.nexus.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.97.159.94.in-addr.arpa	name = 23406.h2.nexus.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.53.33.68 attack
Unauthorized connection attempt detected from IP address 79.53.33.68 to port 8080
2020-05-12 23:02:10
197.232.41.171 attackspambots
Unauthorized connection attempt detected from IP address 197.232.41.171 to port 8080
2020-05-12 22:42:45
5.8.10.202 attackspambots
Unauthorized connection attempt detected from IP address 5.8.10.202 to port 80 [T]
2020-05-12 23:14:17
2.147.205.249 attackspambots
Unauthorized connection attempt detected from IP address 2.147.205.249 to port 445
2020-05-12 23:14:41
96.75.133.125 attack
Unauthorized connection attempt detected from IP address 96.75.133.125 to port 80
2020-05-12 22:57:50
197.50.187.181 attackspambots
20/5/12@10:16:16: FAIL: Alarm-Network address from=197.50.187.181
20/5/12@10:16:16: FAIL: Alarm-Network address from=197.50.187.181
...
2020-05-12 22:43:15
139.59.67.82 attackbotsspam
Bruteforce detected by fail2ban
2020-05-12 22:50:09
89.40.73.232 attack
Unauthorized connection attempt detected from IP address 89.40.73.232 to port 443
2020-05-12 23:27:53
89.40.73.224 attackbots
Unauthorized connection attempt detected from IP address 89.40.73.224 to port 8081
2020-05-12 23:31:14
189.208.237.164 attackbotsspam
Unauthorized connection attempt detected from IP address 189.208.237.164 to port 23
2020-05-12 22:45:08
89.40.73.231 attackspam
Unauthorized connection attempt detected from IP address 89.40.73.231 to port 8888
2020-05-12 23:28:17
213.66.45.122 attackbots
Unauthorized connection attempt detected from IP address 213.66.45.122 to port 23
2020-05-12 23:15:33
63.225.172.223 attack
Unauthorized connection attempt detected from IP address 63.225.172.223 to port 5555
2020-05-12 23:07:59
41.42.224.180 attackbots
Unauthorized connection attempt detected from IP address 41.42.224.180 to port 8080
2020-05-12 23:09:55
220.132.171.208 attack
Honeypot attack, port: 81, PTR: 220-132-171-208.HINET-IP.hinet.net.
2020-05-12 22:37:30

Recently Reported IPs

140.93.109.73 40.38.160.253 187.92.154.148 192.25.144.51
119.29.248.159 150.84.147.152 26.217.195.10 121.229.147.149
221.40.133.64 24.76.173.135 7.42.36.78 80.27.120.86
150.213.37.12 240.71.65.62 208.98.154.141 2.64.55.34
68.117.237.216 205.28.228.109 88.228.21.193 181.251.167.42