Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.134.67.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.134.67.125.			IN	A

;; AUTHORITY SECTION:
.			156	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012101 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 22 09:56:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 125.67.134.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.67.134.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.119.165.120 attackspam
Aug 16 11:30:05 datentool sshd[32152]: Invalid user hostnamed from 113.119.165.120
Aug 16 11:30:05 datentool sshd[32152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.119.165.120 
Aug 16 11:30:07 datentool sshd[32152]: Failed password for invalid user hostnamed from 113.119.165.120 port 5776 ssh2
Aug 16 11:45:57 datentool sshd[32602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.119.165.120  user=r.r
Aug 16 11:45:59 datentool sshd[32602]: Failed password for r.r from 113.119.165.120 port 5777 ssh2
Aug 16 11:51:12 datentool sshd[32652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.119.165.120  user=ftp
Aug 16 11:51:13 datentool sshd[32652]: Failed password for ftp from 113.119.165.120 port 5778 ssh2
Aug 16 11:56:14 datentool sshd[32766]: Invalid user ansible from 113.119.165.120
Aug 16 11:56:14 datentool sshd[32766]: pam_unix(sshd:a........
-------------------------------
2020-08-16 20:45:05
103.115.25.104 attackspam
Aug 16 10:45:41 zimbra sshd[23693]: Invalid user xuyuanchao from 103.115.25.104
Aug 16 10:45:41 zimbra sshd[23693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.25.104
Aug 16 10:45:43 zimbra sshd[23693]: Failed password for invalid user xuyuanchao from 103.115.25.104 port 34934 ssh2
Aug 16 10:45:43 zimbra sshd[23693]: Received disconnect from 103.115.25.104 port 34934:11: Bye Bye [preauth]
Aug 16 10:45:43 zimbra sshd[23693]: Disconnected from 103.115.25.104 port 34934 [preauth]
Aug 16 11:09:27 zimbra sshd[10707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.25.104  user=r.r
Aug 16 11:09:29 zimbra sshd[10707]: Failed password for r.r from 103.115.25.104 port 57808 ssh2
Aug 16 11:09:29 zimbra sshd[10707]: Received disconnect from 103.115.25.104 port 57808:11: Bye Bye [preauth]
Aug 16 11:09:29 zimbra sshd[10707]: Disconnected from 103.115.25.104 port 57808 [preauth]
Aug 16........
-------------------------------
2020-08-16 21:00:11
103.219.112.48 attack
Aug 16 15:17:04 lukav-desktop sshd\[9517\]: Invalid user www from 103.219.112.48
Aug 16 15:17:04 lukav-desktop sshd\[9517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.48
Aug 16 15:17:06 lukav-desktop sshd\[9517\]: Failed password for invalid user www from 103.219.112.48 port 52578 ssh2
Aug 16 15:25:42 lukav-desktop sshd\[13725\]: Invalid user gitolite from 103.219.112.48
Aug 16 15:25:42 lukav-desktop sshd\[13725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.48
2020-08-16 21:06:24
115.236.167.108 attackbotsspam
Aug 16 14:51:24 abendstille sshd\[3313\]: Invalid user faina from 115.236.167.108
Aug 16 14:51:24 abendstille sshd\[3313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.167.108
Aug 16 14:51:26 abendstille sshd\[3313\]: Failed password for invalid user faina from 115.236.167.108 port 38752 ssh2
Aug 16 14:57:00 abendstille sshd\[9470\]: Invalid user mdm from 115.236.167.108
Aug 16 14:57:00 abendstille sshd\[9470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.167.108
...
2020-08-16 21:13:54
45.55.145.31 attackspambots
$f2bV_matches
2020-08-16 20:57:47
80.241.212.137 attackspambots
Aug 16 13:49:22 rocket sshd[32217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.241.212.137
Aug 16 13:49:24 rocket sshd[32217]: Failed password for invalid user fabricio from 80.241.212.137 port 44936 ssh2
...
2020-08-16 20:54:33
154.0.161.99 attackbots
2020-08-16T12:35:46.067859shield sshd\[20770\]: Invalid user money from 154.0.161.99 port 41120
2020-08-16T12:35:46.077812shield sshd\[20770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=baymonitoring.dedicated.co.za
2020-08-16T12:35:47.683797shield sshd\[20770\]: Failed password for invalid user money from 154.0.161.99 port 41120 ssh2
2020-08-16T12:40:46.916053shield sshd\[21630\]: Invalid user ed from 154.0.161.99 port 50550
2020-08-16T12:40:46.924820shield sshd\[21630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=baymonitoring.dedicated.co.za
2020-08-16 21:13:21
5.190.33.232 attackbots
Automatic report - Port Scan Attack
2020-08-16 21:15:37
60.167.180.177 attack
Aug 16 14:25:43 [host] sshd[7464]: Invalid user li
Aug 16 14:25:43 [host] sshd[7464]: pam_unix(sshd:a
Aug 16 14:25:45 [host] sshd[7464]: Failed password
2020-08-16 21:00:45
134.175.130.52 attackbotsspam
Aug 16 14:35:37 haigwepa sshd[5429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.130.52 
Aug 16 14:35:39 haigwepa sshd[5429]: Failed password for invalid user user from 134.175.130.52 port 42058 ssh2
...
2020-08-16 20:53:56
46.101.113.206 attackbotsspam
Aug 16 14:10:05 *hidden* sshd[54660]: Failed password for invalid user mysql from 46.101.113.206 port 44462 ssh2 Aug 16 14:22:41 *hidden* sshd[19738]: Invalid user albatros from 46.101.113.206 port 38120 Aug 16 14:22:41 *hidden* sshd[19738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.113.206 Aug 16 14:22:43 *hidden* sshd[19738]: Failed password for invalid user albatros from 46.101.113.206 port 38120 ssh2 Aug 16 14:26:03 *hidden* sshd[27983]: Invalid user uyt from 46.101.113.206 port 45134
2020-08-16 20:37:36
134.209.97.42 attackbots
Aug 16 02:38:24 web1 sshd\[13356\]: Invalid user tomek from 134.209.97.42
Aug 16 02:38:24 web1 sshd\[13356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.42
Aug 16 02:38:26 web1 sshd\[13356\]: Failed password for invalid user tomek from 134.209.97.42 port 45734 ssh2
Aug 16 02:42:42 web1 sshd\[13770\]: Invalid user student1 from 134.209.97.42
Aug 16 02:42:42 web1 sshd\[13770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.42
2020-08-16 20:52:07
220.130.178.36 attackbots
Fail2Ban
2020-08-16 21:09:57
112.85.42.172 attackbotsspam
Aug 16 06:03:42 propaganda sshd[15120]: Connection from 112.85.42.172 port 54109 on 10.0.0.161 port 22 rdomain ""
Aug 16 06:03:43 propaganda sshd[15120]: Unable to negotiate with 112.85.42.172 port 54109: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
2020-08-16 21:05:56
193.112.160.203 attackbots
Aug 16 14:20:37 minden010 sshd[30894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.160.203
Aug 16 14:20:39 minden010 sshd[30894]: Failed password for invalid user git from 193.112.160.203 port 43238 ssh2
Aug 16 14:25:41 minden010 sshd[32664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.160.203
...
2020-08-16 21:04:48

Recently Reported IPs

41.203.88.243 114.0.147.106 213.142.96.215 32.164.232.79
193.103.110.119 238.3.162.53 189.125.171.126 9.58.144.140
173.138.47.161 212.64.62.210 111.90.150.174 230.231.40.7
222.191.202.104 241.0.102.129 38.25.215.84 147.9.50.126
134.25.153.105 7.158.171.254 10.186.16.175 86.184.214.89