Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.82.225.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13507
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.82.225.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 11:03:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
157.225.82.94.in-addr.arpa domain name pointer host-94-82-225-157.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.225.82.94.in-addr.arpa	name = host-94-82-225-157.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.104.235.150 attack
Unauthorized connection attempt from IP address 5.104.235.150 on Port 445(SMB)
2020-06-01 18:34:08
222.124.139.163 attackspambots
Unauthorized connection attempt from IP address 222.124.139.163 on Port 445(SMB)
2020-06-01 18:40:07
91.214.114.7 attackbotsspam
Jun  1 12:06:34 OPSO sshd\[9355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7  user=root
Jun  1 12:06:36 OPSO sshd\[9355\]: Failed password for root from 91.214.114.7 port 59534 ssh2
Jun  1 12:10:32 OPSO sshd\[10230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7  user=root
Jun  1 12:10:34 OPSO sshd\[10230\]: Failed password for root from 91.214.114.7 port 35964 ssh2
Jun  1 12:14:21 OPSO sshd\[11046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7  user=root
2020-06-01 18:32:32
103.108.187.98 attackbotsspam
Jun  1 05:25:57 extapp sshd[5931]: Failed password for r.r from 103.108.187.98 port 48048 ssh2
Jun  1 05:30:08 extapp sshd[8463]: Failed password for r.r from 103.108.187.98 port 54542 ssh2
Jun  1 05:34:15 extapp sshd[10617]: Failed password for r.r from 103.108.187.98 port 32812 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.108.187.98
2020-06-01 18:21:40
106.12.241.109 attackbots
Jun  1 05:43:32 haigwepa sshd[8934]: Failed password for root from 106.12.241.109 port 19352 ssh2
...
2020-06-01 18:30:23
42.113.219.231 attackspam
Unauthorized connection attempt from IP address 42.113.219.231 on Port 445(SMB)
2020-06-01 18:31:43
162.62.29.207 attackspambots
Lines containing failures of 162.62.29.207
Jun  1 04:42:07 shared01 sshd[11493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.62.29.207  user=r.r
Jun  1 04:42:09 shared01 sshd[11493]: Failed password for r.r from 162.62.29.207 port 43124 ssh2
Jun  1 04:42:09 shared01 sshd[11493]: Received disconnect from 162.62.29.207 port 43124:11: Bye Bye [preauth]
Jun  1 04:42:09 shared01 sshd[11493]: Disconnected from authenticating user r.r 162.62.29.207 port 43124 [preauth]
Jun  1 04:49:19 shared01 sshd[13545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.62.29.207  user=r.r
Jun  1 04:49:21 shared01 sshd[13545]: Failed password for r.r from 162.62.29.207 port 38844 ssh2
Jun  1 04:49:21 shared01 sshd[13545]: Received disconnect from 162.62.29.207 port 38844:11: Bye Bye [preauth]
Jun  1 04:49:21 shared01 sshd[13545]: Disconnected from authenticating user r.r 162.62.29.207 port 38844 [preauth........
------------------------------
2020-06-01 18:44:41
119.192.243.56 attack
port 23
2020-06-01 18:31:10
164.132.225.151 attackspam
2020-06-01T09:41:39.729314centos sshd[10320]: Failed password for root from 164.132.225.151 port 46793 ssh2
2020-06-01T09:45:07.048374centos sshd[10540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.225.151  user=root
2020-06-01T09:45:09.214819centos sshd[10540]: Failed password for root from 164.132.225.151 port 49181 ssh2
...
2020-06-01 18:36:11
5.236.131.208 attack
Unauthorized connection attempt from IP address 5.236.131.208 on Port 445(SMB)
2020-06-01 18:35:52
49.48.246.47 attackbots
Unauthorized connection attempt from IP address 49.48.246.47 on Port 445(SMB)
2020-06-01 18:26:24
222.186.175.215 attack
Jun  1 06:05:02 NPSTNNYC01T sshd[16037]: Failed password for root from 222.186.175.215 port 26946 ssh2
Jun  1 06:05:06 NPSTNNYC01T sshd[16037]: Failed password for root from 222.186.175.215 port 26946 ssh2
Jun  1 06:05:15 NPSTNNYC01T sshd[16037]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 26946 ssh2 [preauth]
...
2020-06-01 18:13:00
106.12.93.141 attackbotsspam
(sshd) Failed SSH login from 106.12.93.141 (CN/China/-): 5 in the last 3600 secs
2020-06-01 18:30:55
101.91.200.186 attack
2020-06-01T06:47:54.846555randservbullet-proofcloud-66.localdomain sshd[13322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186  user=root
2020-06-01T06:47:56.386463randservbullet-proofcloud-66.localdomain sshd[13322]: Failed password for root from 101.91.200.186 port 34988 ssh2
2020-06-01T07:02:25.379868randservbullet-proofcloud-66.localdomain sshd[13410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186  user=root
2020-06-01T07:02:27.828479randservbullet-proofcloud-66.localdomain sshd[13410]: Failed password for root from 101.91.200.186 port 35168 ssh2
...
2020-06-01 18:35:25
216.196.223.82 attack
 TCP (SYN) 216.196.223.82:53112 -> port 23, len 44
2020-06-01 18:29:38

Recently Reported IPs

250.226.135.230 128.127.147.111 64.211.107.181 131.159.98.76
197.97.67.32 58.151.21.85 191.24.89.227 185.122.19.203
53.107.99.5 23.39.25.0 168.255.214.149 25.36.29.159
136.66.231.22 165.213.96.87 120.104.236.108 24.113.105.170
73.80.124.247 190.210.12.62 207.211.77.115 245.193.75.214