Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Athens

Region: Attica

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: OTEnet S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
94.66.221.176 attackbotsspam
probing for exploits
2020-09-19 03:30:03
94.66.221.176 attackspam
probing for exploits
2020-09-18 19:32:09
94.66.220.102 attack
jannisjulius.de 94.66.220.102 [31/Jul/2020:22:29:36 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4269 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
jannisjulius.de 94.66.220.102 [31/Jul/2020:22:29:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4269 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-08-01 08:27:19
94.66.220.70 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-05 16:41:50
94.66.250.70 attackspam
Honeypot attack, port: 81, PTR: ppp-94-66-250-70.home.otenet.gr.
2020-06-11 21:27:09
94.66.249.170 attackspam
trying to access non-authorized port
2020-05-02 03:55:16
94.66.27.14 attack
Port probing on unauthorized port 26
2020-03-27 14:34:35
94.66.229.168 attackbotsspam
Telnet Server BruteForce Attack
2020-03-22 21:27:06
94.66.23.237 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 00:31:52
94.66.23.92 attackspambots
Honeypot attack, port: 5555, PTR: ppp-94-66-23-92.home.otenet.gr.
2020-03-03 13:59:01
94.66.222.65 attackspam
WordPress XMLRPC scan :: 94.66.222.65 0.100 - [15/Feb/2020:13:52:39  0000] www.[censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" "HTTP/1.1"
2020-02-16 00:06:00
94.66.222.6 attackbotsspam
SSH login attempts with user root at 2020-02-05.
2020-02-06 13:59:37
94.66.209.165 attackspam
23/tcp 23/tcp
[2020-01-20/27]2pkt
2020-01-28 03:20:34
94.66.221.107 attackbotsspam
Email rejected due to spam filtering
2020-01-27 09:30:21
94.66.223.194 attack
1577055099 - 12/22/2019 23:51:39 Host: 94.66.223.194/94.66.223.194 Port: 445 TCP Blocked
2019-12-23 08:12:55
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.66.2.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45786
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.66.2.92.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 21:32:07 CST 2019
;; MSG SIZE  rcvd: 114

Host info
92.2.66.94.in-addr.arpa domain name pointer oagwx2.static.otenet.gr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
92.2.66.94.in-addr.arpa	name = oagwx2.static.otenet.gr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
109.248.143.50 attack
109.248.143.50 [109.248.143.50] - - [20/Dec/2019:14:56:45 +0900] "POST /cgi-bin/yybbs/yybbs.cgi HTTP/1.0" 406 249 "http://*.*.*/cgi-bin/yybbs/yybbs.cgi?page=10" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/B85648"
2019-12-20 22:32:53
54.39.138.246 attack
Dec 19 22:20:14 auw2 sshd\[29951\]: Invalid user marez from 54.39.138.246
Dec 19 22:20:14 auw2 sshd\[29951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip246.ip-54-39-138.net
Dec 19 22:20:16 auw2 sshd\[29951\]: Failed password for invalid user marez from 54.39.138.246 port 36860 ssh2
Dec 19 22:25:27 auw2 sshd\[30680\]: Invalid user udayasekaran from 54.39.138.246
Dec 19 22:25:27 auw2 sshd\[30680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip246.ip-54-39-138.net
2019-12-20 22:20:33
103.193.174.234 attackspambots
Invalid user kumiko from 103.193.174.234 port 37569
2019-12-20 21:51:11
36.70.39.89 attackspam
1576822971 - 12/20/2019 07:22:51 Host: 36.70.39.89/36.70.39.89 Port: 445 TCP Blocked
2019-12-20 22:33:31
51.38.188.63 attackbotsspam
Dec 20 15:09:42 cvbnet sshd[21319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.63 
Dec 20 15:09:43 cvbnet sshd[21319]: Failed password for invalid user nagata from 51.38.188.63 port 52054 ssh2
...
2019-12-20 22:25:55
167.99.163.76 attack
Unauthorized connection attempt detected from IP address 167.99.163.76 to port 23
2019-12-20 22:00:08
51.89.166.45 attackspambots
Dec 20 11:23:39 Ubuntu-1404-trusty-64-minimal sshd\[897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.166.45  user=root
Dec 20 11:23:42 Ubuntu-1404-trusty-64-minimal sshd\[897\]: Failed password for root from 51.89.166.45 port 58216 ssh2
Dec 20 11:33:08 Ubuntu-1404-trusty-64-minimal sshd\[9686\]: Invalid user stefanussen from 51.89.166.45
Dec 20 11:33:10 Ubuntu-1404-trusty-64-minimal sshd\[9686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.166.45
Dec 20 11:33:12 Ubuntu-1404-trusty-64-minimal sshd\[9686\]: Failed password for invalid user stefanussen from 51.89.166.45 port 59298 ssh2
2019-12-20 22:25:35
27.57.153.218 attack
Dec 20 07:13:13 ms-srv sshd[16083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.57.153.218
Dec 20 07:13:15 ms-srv sshd[16083]: Failed password for invalid user hacker from 27.57.153.218 port 4309 ssh2
2019-12-20 22:23:26
159.203.176.82 attack
[munged]::443 159.203.176.82 - - [20/Dec/2019:10:46:02 +0100] "POST /[munged]: HTTP/1.1" 200 7824 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-20 21:56:10
128.199.167.233 attackspam
Invalid user moutafian from 128.199.167.233 port 53108
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.167.233
Failed password for invalid user moutafian from 128.199.167.233 port 53108 ssh2
Invalid user 123Darwin from 128.199.167.233 port 58880
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.167.233
2019-12-20 22:11:42
121.150.157.123 attackbotsspam
Shenzhen TVT DVR Remote Code Execution Vulnerability
2019-12-20 22:26:25
51.158.90.173 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-20 22:30:16
51.158.90.174 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-20 22:18:16
106.75.165.187 attack
SSH Brute-Force reported by Fail2Ban
2019-12-20 22:15:17
189.146.112.90 attackbots
port scan and connect, tcp 23 (telnet)
2019-12-20 22:31:08

Recently Reported IPs

98.225.72.214 84.131.105.254 162.99.124.211 183.194.44.3
203.147.15.175 142.100.84.34 80.231.180.75 86.92.253.136
208.166.111.85 52.215.107.73 138.91.254.80 34.75.132.135
120.90.111.45 203.153.245.74 153.193.162.144 27.199.232.208
217.52.60.157 88.33.117.193 185.162.235.188 150.63.245.194