Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.63.216.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.63.216.159.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:55:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
159.216.63.94.in-addr.arpa domain name pointer 159.216.63.94.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.216.63.94.in-addr.arpa	name = 159.216.63.94.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.146.50.35 attack
Apr 12 05:51:58  exim[6986]: [1\48] 1jNTf3-0001og-9e H=shut.isefardi.com (shut.callbite.com) [194.146.50.35] F= rejected after DATA: This message scored 101.1 spam points.
2020-04-12 17:01:51
188.131.239.119 attackspam
Apr 12 06:18:20 pi sshd[27491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.239.119  user=root
Apr 12 06:18:23 pi sshd[27491]: Failed password for invalid user root from 188.131.239.119 port 54122 ssh2
2020-04-12 17:06:22
180.168.141.246 attackbotsspam
SSH Brute Force
2020-04-12 16:55:44
112.112.19.138 attack
" "
2020-04-12 17:17:23
159.89.171.121 attackbots
(sshd) Failed SSH login from 159.89.171.121 (IN/India/www.letsthankyou.com): 5 in the last 3600 secs
2020-04-12 17:05:05
95.234.238.38 attackspam
20/4/11@23:51:36: FAIL: Alarm-Network address from=95.234.238.38
...
2020-04-12 17:16:24
112.85.42.237 attack
Apr 12 04:42:12 NPSTNNYC01T sshd[9255]: Failed password for root from 112.85.42.237 port 58266 ssh2
Apr 12 04:43:20 NPSTNNYC01T sshd[9442]: Failed password for root from 112.85.42.237 port 24873 ssh2
...
2020-04-12 16:56:14
139.59.79.202 attack
Apr 12 10:46:16 eventyay sshd[29639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.79.202
Apr 12 10:46:18 eventyay sshd[29639]: Failed password for invalid user mysql from 139.59.79.202 port 57468 ssh2
Apr 12 10:48:52 eventyay sshd[29693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.79.202
...
2020-04-12 16:59:58
106.13.54.106 attackspam
$f2bV_matches
2020-04-12 17:13:11
139.155.21.186 attackbots
SSH invalid-user multiple login try
2020-04-12 17:14:06
217.138.76.66 attackbots
Apr 12 09:21:17 xeon sshd[28244]: Failed password for root from 217.138.76.66 port 53843 ssh2
2020-04-12 17:11:06
222.186.30.112 attack
2020-04-12T09:31:37.294091vps773228.ovh.net sshd[31792]: Failed password for root from 222.186.30.112 port 21880 ssh2
2020-04-12T09:31:40.033588vps773228.ovh.net sshd[31792]: Failed password for root from 222.186.30.112 port 21880 ssh2
2020-04-12T09:31:41.871129vps773228.ovh.net sshd[31792]: Failed password for root from 222.186.30.112 port 21880 ssh2
2020-04-12T10:43:49.231503vps773228.ovh.net sshd[26320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-04-12T10:43:51.144652vps773228.ovh.net sshd[26320]: Failed password for root from 222.186.30.112 port 60641 ssh2
...
2020-04-12 16:57:40
45.238.229.45 attack
SSH bruteforce
2020-04-12 17:07:40
167.172.207.139 attackspam
$f2bV_matches
2020-04-12 17:08:19
34.80.135.20 attackspambots
Apr  6 18:31:11 *** sshd[56355]: Invalid user pdf from 34.80.135.20
Apr  6 18:31:11 *** sshd[56355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.135.20 
Apr  6 18:31:12 *** sshd[56355]: Failed password for invalid user pdf from 34.80.135.20 port 34464 ssh2
Apr  6 18:42:47 *** sshd[58193]: Invalid user ts3bot2 from 34.80.135.20
Apr  6 18:42:47 *** sshd[58193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.135.20
2020-04-12 17:20:06

Recently Reported IPs

121.127.241.78 120.85.41.3 202.73.27.213 180.183.122.69
61.74.89.102 59.93.17.239 103.79.96.209 14.207.18.97
162.191.8.22 52.56.134.169 104.47.10.53 83.202.219.180
116.104.69.16 117.5.140.221 103.144.14.194 193.233.230.110
186.24.45.114 46.109.89.73 172.241.214.245 236.64.65.148