Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.149.225.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.149.225.12.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051002 1800 900 604800 86400

;; Query time: 401 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 11 08:30:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 12.225.149.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.225.149.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
194.25.134.8 attack
SSH login attempts.
2020-03-29 18:05:43
198.185.159.145 attack
SSH login attempts.
2020-03-29 18:17:32
196.52.43.66 attackspambots
Port 389 scan denied
2020-03-29 17:57:22
211.119.134.201 attack
SSH login attempts.
2020-03-29 17:54:38
59.111.192.69 attackspam
SSH login attempts.
2020-03-29 18:31:39
140.143.200.251 attackspam
Mar 29 03:46:29 firewall sshd[3065]: Invalid user ang from 140.143.200.251
Mar 29 03:46:31 firewall sshd[3065]: Failed password for invalid user ang from 140.143.200.251 port 46432 ssh2
Mar 29 03:51:35 firewall sshd[3316]: Invalid user das from 140.143.200.251
...
2020-03-29 18:06:04
74.125.28.26 attackspam
SSH login attempts.
2020-03-29 18:42:25
209.203.34.199 attackbots
SSH login attempts.
2020-03-29 17:57:04
141.98.10.137 attack
(smtpauth) Failed SMTP AUTH login from 141.98.10.137 (LT/Republic of Lithuania/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-03-29 11:38:46 login authenticator failed for (User) [141.98.10.137]: 535 Incorrect authentication data (set_id=whiskey)
2020-03-29 11:38:47 login authenticator failed for (User) [141.98.10.137]: 535 Incorrect authentication data (set_id=whiskey)
2020-03-29 12:00:05 login authenticator failed for (User) [141.98.10.137]: 535 Incorrect authentication data (set_id=fantasy)
2020-03-29 12:00:07 login authenticator failed for (User) [141.98.10.137]: 535 Incorrect authentication data (set_id=fantasy)
2020-03-29 12:21:29 login authenticator failed for (User) [141.98.10.137]: 535 Incorrect authentication data (set_id=sowhat)
2020-03-29 18:22:14
89.248.160.150 attackspam
89.248.160.150 was recorded 23 times by 12 hosts attempting to connect to the following ports: 3331,3330,3328. Incident counter (4h, 24h, all-time): 23, 123, 9081
2020-03-29 18:40:33
176.31.127.152 attackbots
SSH Brute Force
2020-03-29 18:13:53
223.252.214.183 attackbots
SSH login attempts.
2020-03-29 18:36:16
185.3.161.12 attackbots
SSH login attempts.
2020-03-29 18:28:17
116.0.20.166 attackspam
SSH login attempts.
2020-03-29 18:32:14
213.205.33.244 attack
SSH login attempts.
2020-03-29 18:31:10

Recently Reported IPs

3.106.45.241 87.249.132.200 3.11.124.84 254.107.97.29
206.48.243.188 80.161.168.167 76.8.117.179 31.129.251.11
184.193.197.156 36.106.64.43 215.40.166.165 103.147.208.58
16.56.49.227 22.126.141.10 177.22.184.103 193.129.0.167
94.20.199.27 193.169.245.97 203.0.0.1 203.0.0.152