Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.64.125.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.64.125.202.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062603 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 09:34:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
202.125.64.1.in-addr.arpa domain name pointer 1-64-125-202.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
202.125.64.1.in-addr.arpa	name = 1-64-125-202.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.68.242.220 attackspambots
$f2bV_matches
2020-07-26 02:45:24
139.199.48.217 attack
Exploited Host.
2020-07-26 02:23:25
49.233.134.252 attackspambots
Jul 25 13:16:10 firewall sshd[26279]: Invalid user oracle from 49.233.134.252
Jul 25 13:16:12 firewall sshd[26279]: Failed password for invalid user oracle from 49.233.134.252 port 57632 ssh2
Jul 25 13:20:13 firewall sshd[26379]: Invalid user stagiaire from 49.233.134.252
...
2020-07-26 02:45:43
139.199.228.154 attackbots
Exploited Host.
2020-07-26 02:24:36
109.190.231.251 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 251-231-190-109.dsl.ovh.fr.
2020-07-26 02:42:08
139.199.115.210 attackspam
Exploited Host.
2020-07-26 02:26:38
202.77.24.222 attack
port 80
2020-07-26 02:24:04
201.55.198.9 attackbotsspam
Jul 25 18:25:23 vpn01 sshd[8061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.198.9
Jul 25 18:25:25 vpn01 sshd[8061]: Failed password for invalid user zhan from 201.55.198.9 port 55776 ssh2
...
2020-07-26 02:07:52
139.186.74.64 attack
Exploited Host.
2020-07-26 02:29:39
183.66.65.214 attack
Jul 25 18:27:44 vps647732 sshd[7884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.66.65.214
Jul 25 18:27:45 vps647732 sshd[7884]: Failed password for invalid user icy from 183.66.65.214 port 37489 ssh2
...
2020-07-26 02:28:52
139.59.18.197 attackspam
Exploited Host.
2020-07-26 02:13:22
192.200.207.127 attackbotsspam
Invalid user xiaowei from 192.200.207.127 port 35308
2020-07-26 02:19:04
69.148.226.251 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-25T16:22:34Z and 2020-07-25T16:35:21Z
2020-07-26 02:13:53
196.52.43.53 attack
 TCP (SYN) 196.52.43.53:53511 -> port 8531, len 44
2020-07-26 02:08:12
54.39.133.91 attackspam
firewall-block, port(s): 20716/tcp
2020-07-26 02:30:37

Recently Reported IPs

1.242.199.115 1.36.118.116 1.220.231.125 1.238.70.15
1.36.234.93 1.34.37.19 118.160.151.49 61.230.133.31
206.168.34.62 106.45.14.6 103.224.52.137 203.204.214.157
203.204.125.228 123.195.57.17 47.81.35.154 185.226.197.44
49.65.150.117 154.200.4.237 40.124.175.188 20.171.8.149