Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.125.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.125.189.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023120901 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 10 04:45:15 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 189.125.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.125.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.114.207.34 attack
Feb 18 08:00:09 MK-Soft-VM3 sshd[28527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.207.34 
Feb 18 08:00:11 MK-Soft-VM3 sshd[28527]: Failed password for invalid user skaner from 122.114.207.34 port 6094 ssh2
...
2020-02-18 18:01:36
68.183.47.9 attackbots
Feb 17 23:08:18 askasleikir sshd[54048]: Failed password for invalid user mysql from 68.183.47.9 port 45774 ssh2
2020-02-18 18:17:34
31.167.5.254 attackbots
Email rejected due to spam filtering
2020-02-18 18:05:20
171.252.37.32 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 18:33:40
195.16.41.18 attack
Email rejected due to spam filtering
2020-02-18 18:24:39
111.231.121.20 attack
Feb 18 07:48:23 XXXXXX sshd[52552]: Invalid user sai from 111.231.121.20 port 50307
2020-02-18 18:13:30
39.98.166.90 attackbots
Automatic report - Web App Attack
2020-02-18 18:10:19
96.78.175.33 attack
Feb 18 04:52:09 sigma sshd\[12925\]: Invalid user rstudio from 96.78.175.33Feb 18 04:52:10 sigma sshd\[12925\]: Failed password for invalid user rstudio from 96.78.175.33 port 60090 ssh2
...
2020-02-18 18:09:12
36.90.20.65 attackbotsspam
20/2/17@23:51:32: FAIL: Alarm-Network address from=36.90.20.65
...
2020-02-18 18:40:18
49.213.189.1 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 18:25:52
67.230.183.193 attackspambots
$f2bV_matches
2020-02-18 18:12:44
154.204.42.22 attackspam
2020-02-18T07:53:40.845447  sshd[23690]: Invalid user testftp from 154.204.42.22 port 45100
2020-02-18T07:53:40.859586  sshd[23690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.42.22
2020-02-18T07:53:40.845447  sshd[23690]: Invalid user testftp from 154.204.42.22 port 45100
2020-02-18T07:53:42.516297  sshd[23690]: Failed password for invalid user testftp from 154.204.42.22 port 45100 ssh2
...
2020-02-18 18:04:37
213.32.91.37 attack
$f2bV_matches
2020-02-18 18:30:04
36.239.51.196 attackspam
Portscan detected
2020-02-18 18:03:07
49.213.197.40 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 18:11:38

Recently Reported IPs

254.100.181.173 159.249.34.112 152.141.130.22 157.230.79.171
103.148.245.233 94.219.6.94 130.125.209.15 60.37.54.113
13.78.33.130 67.245.85.40 102.82.165.45 123.169.36.147
12.22.2.62 158.204.188.58 175.176.26.212 154.91.201.80
171.237.110.219 17.129.231.151 210.72.173.130 139.59.84.141