Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.125.220.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.125.220.142.		IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:51:06 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 142.220.125.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.220.125.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.167.48.173 attackbotsspam
Jul  8 20:30:14 mout sshd[6256]: Invalid user support from 112.167.48.173 port 43068
Jul  8 20:30:16 mout sshd[6256]: Failed password for invalid user support from 112.167.48.173 port 43068 ssh2
Jul  8 20:30:16 mout sshd[6256]: Connection closed by 112.167.48.173 port 43068 [preauth]
2019-07-09 10:53:20
107.170.192.236 attackspam
Automatic report - Web App Attack
2019-07-09 10:31:37
210.6.240.180 attackbots
Jul  8 20:22:02 econome sshd[379]: Failed password for invalid user admin from 210.6.240.180 port 35510 ssh2
Jul  8 20:22:04 econome sshd[379]: Failed password for invalid user admin from 210.6.240.180 port 35510 ssh2
Jul  8 20:22:06 econome sshd[379]: Failed password for invalid user admin from 210.6.240.180 port 35510 ssh2
Jul  8 20:22:10 econome sshd[379]: Failed password for invalid user admin from 210.6.240.180 port 35510 ssh2
Jul  8 20:22:12 econome sshd[379]: Failed password for invalid user admin from 210.6.240.180 port 35510 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=210.6.240.180
2019-07-09 10:20:32
104.131.39.165 attackbots
104.131.39.165 - - \[08/Jul/2019:21:43:42 +0200\] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.131.39.165 - - \[08/Jul/2019:21:43:42 +0200\] "POST /wp-login.php HTTP/1.1" 200 2087 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-07-09 10:55:56
113.206.95.62 attackspam
port scan and connect, tcp 23 (telnet)
2019-07-09 10:40:32
178.128.215.16 attack
frenzy
2019-07-09 10:24:04
202.155.234.28 attackspam
Jul  9 03:57:22 ncomp sshd[30420]: Invalid user jenkins from 202.155.234.28
Jul  9 03:57:22 ncomp sshd[30420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.155.234.28
Jul  9 03:57:22 ncomp sshd[30420]: Invalid user jenkins from 202.155.234.28
Jul  9 03:57:24 ncomp sshd[30420]: Failed password for invalid user jenkins from 202.155.234.28 port 11982 ssh2
2019-07-09 11:04:13
42.200.150.157 attack
Unauthorized connection attempt from IP address 42.200.150.157 on Port 445(SMB)
2019-07-09 10:21:05
157.230.246.198 attack
Jul  9 03:55:08 icinga sshd[14200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.246.198
Jul  9 03:55:10 icinga sshd[14200]: Failed password for invalid user carlin from 157.230.246.198 port 37296 ssh2
...
2019-07-09 10:34:57
137.74.242.237 attackbotsspam
DATE:2019-07-08_20:29:46, IP:137.74.242.237, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-09 11:06:14
206.189.202.165 attackspam
2019-07-08T17:09:21.047520WS-Zach sshd[26885]: Invalid user nagios from 206.189.202.165 port 56424
2019-07-08T17:09:21.051196WS-Zach sshd[26885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.202.165
2019-07-08T17:09:21.047520WS-Zach sshd[26885]: Invalid user nagios from 206.189.202.165 port 56424
2019-07-08T17:09:23.182530WS-Zach sshd[26885]: Failed password for invalid user nagios from 206.189.202.165 port 56424 ssh2
2019-07-08T17:11:12.188789WS-Zach sshd[27842]: Invalid user fff from 206.189.202.165 port 50790
...
2019-07-09 11:03:40
68.183.107.224 attack
Automatic report - Web App Attack
2019-07-09 10:51:22
14.186.69.150 attack
Unauthorized connection attempt from IP address 14.186.69.150 on Port 445(SMB)
2019-07-09 10:43:16
188.163.42.162 attackbots
Unauthorized connection attempt from IP address 188.163.42.162 on Port 445(SMB)
2019-07-09 10:19:06
14.250.208.88 attack
Unauthorized connection attempt from IP address 14.250.208.88 on Port 445(SMB)
2019-07-09 10:23:26

Recently Reported IPs

114.125.221.181 113.53.105.113 114.125.228.44 114.125.222.12
114.125.220.84 114.125.23.42 114.125.230.143 114.125.221.169
114.125.220.117 114.125.229.207 114.125.23.102 114.125.230.8
114.125.232.147 114.125.232.54 114.125.24.5 113.53.105.130
114.125.237.233 114.125.24.8 114.125.24.83 114.125.244.89