Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.150.66.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.150.66.203.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 16:28:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 203.66.150.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 203.66.150.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.229.168.154 attackspambots
Malicious Traffic/Form Submission
2019-12-31 04:15:50
92.50.133.22 attack
Unauthorized connection attempt detected from IP address 92.50.133.22 to port 445
2019-12-31 03:39:39
181.49.132.18 attackbotsspam
Dec 30 19:02:29 sxvn sshd[2296131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.132.18
2019-12-31 03:58:34
41.73.252.236 attack
2019-09-12T04:27:43.224649suse-nuc sshd[17378]: Invalid user admin from 41.73.252.236 port 55694
...
2019-12-31 04:16:21
42.117.20.183 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-31 03:51:58
45.136.108.22 attack
Unauthorized connection attempt detected from IP address 45.136.108.22 to port 4890
2019-12-31 03:45:06
112.67.253.202 attack
Unauthorized connection attempt detected from IP address 112.67.253.202 to port 1433
2019-12-31 03:36:50
60.190.10.42 attackspam
Unauthorised access (Dec 30) SRC=60.190.10.42 LEN=52 TOS=0x02 TTL=116 ID=21091 DF TCP DPT=1433 WINDOW=8192 CWR ECE SYN
2019-12-31 03:59:52
111.206.120.250 attackbots
Unauthorized connection attempt detected from IP address 111.206.120.250 to port 1433
2019-12-31 03:37:36
27.185.1.10 attackspam
Unauthorized connection attempt detected from IP address 27.185.1.10 to port 1433
2019-12-31 03:47:55
222.186.175.155 attack
--- report ---
Dec 30 16:45:34 -0300 sshd: Connection from 222.186.175.155 port 44484
Dec 30 16:45:37 -0300 sshd: Failed password for root from 222.186.175.155 port 44484 ssh2
Dec 30 16:45:38 -0300 sshd: Received disconnect from 222.186.175.155: 11:  [preauth]
2019-12-31 04:05:57
42.113.155.178 attackspambots
Unauthorized connection attempt detected from IP address 42.113.155.178 to port 445
2019-12-31 03:46:58
222.186.175.182 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
2019-12-31 04:05:33
42.117.20.209 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-31 03:45:43
27.155.87.176 attackspambots
Unauthorized connection attempt detected from IP address 27.155.87.176 to port 2222
2019-12-31 03:48:21

Recently Reported IPs

74.51.221.238 108.122.255.180 154.147.203.74 232.221.78.177
96.141.85.70 103.85.216.87 97.138.80.252 251.6.238.71
119.231.196.69 121.110.110.91 7.112.114.190 234.57.79.80
34.158.87.30 235.128.141.191 78.46.223.51 174.78.162.230
192.224.141.86 164.118.187.222 188.102.178.62 236.62.122.2