Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.225.94.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 190
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;156.225.94.66.			IN	A

;; AUTHORITY SECTION:
.			194	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121701 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 18 04:00:09 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 66.94.225.156.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.94.225.156.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.17.43.13 attackspam
20 attempts against mh-ssh on plane.magehost.pro
2019-06-22 14:02:21
188.16.36.93 attackspam
Autoban   188.16.36.93 AUTH/CONNECT
2019-06-22 14:09:48
201.216.193.65 attack
Invalid user admin from 201.216.193.65 port 34119
2019-06-22 14:18:59
201.16.166.120 attackspam
19/6/22@00:37:19: FAIL: Alarm-Intrusion address from=201.16.166.120
...
2019-06-22 14:12:01
120.92.19.88 attack
Port scan on 2 port(s): 6379 6380
2019-06-22 14:03:10
191.53.222.219 attack
SMTP-sasl brute force
...
2019-06-22 14:16:59
185.193.125.42 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.193.125.42  user=root
Failed password for root from 185.193.125.42 port 46024 ssh2
Failed password for root from 185.193.125.42 port 46024 ssh2
Failed password for root from 185.193.125.42 port 46024 ssh2
Failed password for root from 185.193.125.42 port 46024 ssh2
2019-06-22 13:51:18
177.43.247.17 attack
Automatic report - Web App Attack
2019-06-22 13:38:57
187.120.133.65 attackbotsspam
SMTP-sasl brute force
...
2019-06-22 14:31:32
179.97.166.249 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-22 06:37:20]
2019-06-22 13:53:36
193.112.93.173 attackspam
Automatic report - Multiple web server 400 error code
2019-06-22 14:36:31
128.199.221.18 attackspambots
Jun 22 07:05:07 localhost sshd\[22058\]: Invalid user fin from 128.199.221.18 port 48349
Jun 22 07:05:07 localhost sshd\[22058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.221.18
Jun 22 07:05:09 localhost sshd\[22058\]: Failed password for invalid user fin from 128.199.221.18 port 48349 ssh2
2019-06-22 13:44:06
104.160.29.28 attackbots
NAME : ROUTER-NETWORKS CIDR : 104.160.20.0/24 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Delaware - block certain countries :) IP: 104.160.29.28  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 14:35:42
37.49.224.155 attack
Brute force SMTP login attempts.
2019-06-22 13:41:16
66.249.79.121 attack
Automatic report - Web App Attack
2019-06-22 13:37:45

Recently Reported IPs

32.137.123.73 201.161.58.37 71.122.58.86 69.242.207.63
172.113.211.57 107.90.68.213 221.51.161.200 123.224.46.250
93.6.126.171 64.203.220.233 119.234.45.235 119.177.235.106
68.246.155.121 115.179.174.216 114.222.97.237 49.196.166.231
71.74.19.196 92.43.140.39 200.162.139.103 179.222.36.66