Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.52.94.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.52.94.221.			IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:33:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 221.94.52.166.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.94.52.166.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
61.133.232.250 attack
Apr 17 14:16:04 firewall sshd[18604]: Failed password for invalid user wk from 61.133.232.250 port 34162 ssh2
Apr 17 14:20:14 firewall sshd[18672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.250  user=root
Apr 17 14:20:17 firewall sshd[18672]: Failed password for root from 61.133.232.250 port 10678 ssh2
...
2020-04-18 02:18:24
92.63.194.108 attackspambots
Automatic report - Banned IP Access
2020-04-18 02:30:35
60.19.201.68 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-18 02:33:20
42.178.127.63 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-18 02:30:04
42.3.51.73 attack
Tried sshing with brute force.
2020-04-18 02:37:31
164.132.197.108 attackspam
Apr 17 09:48:49 ny01 sshd[25544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.197.108
Apr 17 09:48:51 ny01 sshd[25544]: Failed password for invalid user ue from 164.132.197.108 port 55976 ssh2
Apr 17 09:53:00 ny01 sshd[26030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.197.108
2020-04-18 02:45:54
111.230.140.177 attack
Automatic report - Banned IP Access
2020-04-18 02:31:54
142.11.227.174 attackbots
ZyXEL P660HN ADSL Router viewlog.asp command injection
2020-04-18 02:28:46
157.52.145.18 attack
Email rejected due to spam filtering
2020-04-18 02:38:14
139.59.58.155 attackspam
Apr 17 19:48:59 markkoudstaal sshd[30561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.155
Apr 17 19:49:01 markkoudstaal sshd[30561]: Failed password for invalid user uf from 139.59.58.155 port 48924 ssh2
Apr 17 19:52:07 markkoudstaal sshd[30954]: Failed password for root from 139.59.58.155 port 53438 ssh2
2020-04-18 02:08:56
181.143.79.154 attack
Brute force username and password attack.
2020-04-18 02:19:15
103.218.114.19 attackspambots
IMAP brute force
...
2020-04-18 02:19:49
220.160.127.108 attackspambots
Helo
2020-04-18 02:33:01
185.216.140.34 attack
Port probing on unauthorized port 3396
2020-04-18 02:20:25
46.148.20.25 attackspambots
firewall-block, port(s): 8822/tcp
2020-04-18 02:41:35

Recently Reported IPs

23.135.225.4 91.121.97.3 43.240.99.32 37.55.168.9
203.195.140.235 50.247.133.61 47.140.135.47 168.187.123.67
230.137.36.32 30.25.4.117 179.15.56.216 225.32.223.102
201.189.80.49 36.225.21.160 45.169.218.180 107.180.123.8
185.219.135.240 199.198.159.253 188.180.196.219 201.195.117.209