Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sanaa

Region: Amanat Al Asimah

Country: Yemen

Internet Service Provider: Y

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.94.13.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.94.13.225.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025041003 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 11 15:44:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
225.13.94.195.in-addr.arpa domain name pointer hosting.teleyemen.com.ye.
225.13.94.195.in-addr.arpa domain name pointer sipexternal.teleyemen.com.ye.
225.13.94.195.in-addr.arpa domain name pointer meet.teleyemen.com.ye.
225.13.94.195.in-addr.arpa domain name pointer dialin.teleyemen.com.ye.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
225.13.94.195.in-addr.arpa	name = hosting.teleyemen.com.ye.
225.13.94.195.in-addr.arpa	name = sipexternal.teleyemen.com.ye.
225.13.94.195.in-addr.arpa	name = meet.teleyemen.com.ye.
225.13.94.195.in-addr.arpa	name = dialin.teleyemen.com.ye.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.95.182.160 attackspambots
Looking for resource vulnerabilities
2019-08-30 10:05:58
176.31.250.160 attack
Invalid user nux from 176.31.250.160 port 34524
2019-08-30 10:13:37
193.169.252.212 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-30 00:40:15,514 INFO [amun_request_handler] PortScan Detected on Port: 25 (193.169.252.212)
2019-08-30 10:20:32
89.234.157.254 attackspambots
Aug 30 04:08:16 apollo sshd\[3219\]: Failed password for root from 89.234.157.254 port 39177 ssh2Aug 30 04:08:18 apollo sshd\[3219\]: Failed password for root from 89.234.157.254 port 39177 ssh2Aug 30 04:08:20 apollo sshd\[3219\]: Failed password for root from 89.234.157.254 port 39177 ssh2
...
2019-08-30 10:09:57
101.255.56.42 attack
Aug 30 05:19:00 yabzik sshd[4216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.56.42
Aug 30 05:19:03 yabzik sshd[4216]: Failed password for invalid user admins from 101.255.56.42 port 50835 ssh2
Aug 30 05:24:29 yabzik sshd[6244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.56.42
2019-08-30 10:37:10
78.128.113.76 attack
Time:     Thu Aug 29 21:21:09 2019 -0400
IP:       78.128.113.76 (BG/Bulgaria/ip-113-76.4vendeta.com)
Failures: 5 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-08-30 09:58:21
187.94.111.49 attackspam
Brute force attempt
2019-08-30 10:14:39
198.199.104.20 attackbotsspam
Aug 30 01:55:43 pkdns2 sshd\[28579\]: Invalid user ca from 198.199.104.20Aug 30 01:55:45 pkdns2 sshd\[28579\]: Failed password for invalid user ca from 198.199.104.20 port 36038 ssh2Aug 30 01:59:45 pkdns2 sshd\[28759\]: Invalid user rpc from 198.199.104.20Aug 30 01:59:47 pkdns2 sshd\[28759\]: Failed password for invalid user rpc from 198.199.104.20 port 52812 ssh2Aug 30 02:03:56 pkdns2 sshd\[28953\]: Invalid user schwein from 198.199.104.20Aug 30 02:03:58 pkdns2 sshd\[28953\]: Failed password for invalid user schwein from 198.199.104.20 port 41348 ssh2
...
2019-08-30 10:38:41
138.197.200.77 attackbots
*Port Scan* detected from 138.197.200.77 (US/United States/-). 4 hits in the last 256 seconds
2019-08-30 10:14:07
186.224.173.105 attack
Automatic report - Port Scan Attack
2019-08-30 10:48:46
106.75.231.207 attackspambots
Aug 29 20:22:11 MK-Soft-VM5 sshd\[31267\]: Invalid user bonec from 106.75.231.207 port 44242
Aug 29 20:22:11 MK-Soft-VM5 sshd\[31267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.207
Aug 29 20:22:13 MK-Soft-VM5 sshd\[31267\]: Failed password for invalid user bonec from 106.75.231.207 port 44242 ssh2
...
2019-08-30 10:18:09
40.117.235.16 attackspam
"Fail2Ban detected SSH brute force attempt"
2019-08-30 09:59:17
143.208.31.42 attack
Brute force attempt
2019-08-30 10:21:19
177.159.122.251 attackbots
Fail2Ban - HTTP Exploit Attempt
2019-08-30 10:22:39
81.215.50.253 attackbots
Automatic report - Port Scan Attack
2019-08-30 10:26:01

Recently Reported IPs

20.221.69.50 185.36.81.82 45.156.128.43 34.76.133.13
113.30.168.121 166.108.229.191 235.197.234.59 115.205.194.110
36.90.123.112 125.212.248.43 113.215.189.60 149.28.143.185
161.35.92.55 97.94.139.167 45.77.227.61 78.209.19.163
59.82.21.103 49.113.92.113 220.197.51.248 183.191.126.129