Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.22.25.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.22.25.94.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020083101 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 01 13:07:14 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 94.25.22.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.25.22.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.93.247.238 attack
Sep  1 11:53:57 server sshd[5657]: User root from 142.93.247.238 not allowed because listed in DenyUsers
Sep  1 11:53:58 server sshd[5657]: Failed password for invalid user root from 142.93.247.238 port 49122 ssh2
Sep  1 11:53:57 server sshd[5657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.247.238  user=root
Sep  1 11:53:57 server sshd[5657]: User root from 142.93.247.238 not allowed because listed in DenyUsers
Sep  1 11:53:58 server sshd[5657]: Failed password for invalid user root from 142.93.247.238 port 49122 ssh2
...
2020-09-01 19:32:21
113.163.177.85 attackspam
Unauthorized connection attempt from IP address 113.163.177.85 on Port 445(SMB)
2020-09-01 19:23:57
213.39.55.13 attack
fail2ban -- 213.39.55.13
...
2020-09-01 19:28:29
167.172.57.1 attackbots
167.172.57.1 - - [01/Sep/2020:12:17:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2207 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.57.1 - - [01/Sep/2020:12:17:48 +0100] "POST /wp-login.php HTTP/1.1" 200 2181 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.57.1 - - [01/Sep/2020:12:17:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2187 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-01 19:25:03
92.118.228.122 attack
Port scan denied
2020-09-01 19:44:42
141.98.252.163 attackbotsspam
sshd
2020-09-01 19:03:18
79.124.62.55 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 3391 proto: tcp cat: Misc Attackbytes: 60
2020-09-01 19:02:44
42.113.215.216 attack
Brute forcing RDP port 3389
2020-09-01 19:35:36
200.236.122.95 attackbotsspam
Automatic report - Port Scan Attack
2020-09-01 19:26:58
154.221.31.52 attackbots
Sep  1 05:46:11 ns41 sshd[16733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.31.52
2020-09-01 19:25:34
49.48.42.197 attackbots
Attempted connection to port 445.
2020-09-01 19:33:15
211.21.214.150 attackspam
Unauthorized connection attempt from IP address 211.21.214.150 on Port 445(SMB)
2020-09-01 19:18:17
218.92.0.204 attackbots
$f2bV_matches
2020-09-01 19:23:29
3.87.139.249 attackspam
Attempted connection to ports 82, 92, 5002, 8881, 25461.
2020-09-01 19:36:01
167.248.133.20 attackbots
 TCP (SYN) 167.248.133.20:57504 -> port 110, len 44
2020-09-01 19:10:05

Recently Reported IPs

78.165.201.223 101.20.92.77 142.118.51.238 13.44.113.186
42.62.48.250 162.176.89.92 161.144.37.26 142.240.12.3
194.8.109.176 65.57.150.45 171.156.66.233 82.119.102.200
71.69.106.229 140.0.44.85 109.190.65.138 152.46.167.244
50.146.85.79 69.47.17.101 34.152.218.174 14.110.229.89