Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.194.125.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.194.125.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 21:17:08 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 12.125.194.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.125.194.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
131.255.174.155 attack
Automatic report - Port Scan Attack
2019-08-08 23:11:29
108.62.202.220 attackspambots
[LAN access from remote] from 108.62.202.220:51884 to 192.168.X.XX:443, Wednesday, Aug 07,2019 19:34:59
2019-08-08 23:18:30
191.53.249.65 attackbots
Aug  8 14:00:21 xeon postfix/smtpd[53056]: warning: unknown[191.53.249.65]: SASL PLAIN authentication failed: authentication failure
2019-08-08 23:49:37
164.132.38.167 attackspam
2019-08-08T12:04:30.506290abusebot-8.cloudsearch.cf sshd\[13949\]: Invalid user guest from 164.132.38.167 port 57147
2019-08-08 23:32:54
218.92.1.156 attackbotsspam
Aug  8 14:01:47 debian sshd\[25424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.156  user=root
Aug  8 14:01:49 debian sshd\[25424\]: Failed password for root from 218.92.1.156 port 13928 ssh2
...
2019-08-08 23:31:39
103.105.98.1 attackspam
Aug  8 16:46:39 eventyay sshd[15698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.98.1
Aug  8 16:46:41 eventyay sshd[15698]: Failed password for invalid user jonathan from 103.105.98.1 port 42804 ssh2
Aug  8 16:52:17 eventyay sshd[16915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.98.1
...
2019-08-08 23:33:22
189.59.237.44 attack
Aug  8 14:04:05 [munged] sshd[15114]: Invalid user direction from 189.59.237.44 port 60989
Aug  8 14:04:05 [munged] sshd[15114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.59.237.44
2019-08-08 23:43:32
104.248.116.76 attack
2019-08-08T13:13:18.307574abusebot-4.cloudsearch.cf sshd\[15481\]: Invalid user leyla from 104.248.116.76 port 53310
2019-08-08 23:04:06
176.31.162.82 attack
Automatic report - Banned IP Access
2019-08-08 22:58:48
106.12.214.21 attackspam
Aug  8 12:02:36 vps200512 sshd\[7682\]: Invalid user bank from 106.12.214.21
Aug  8 12:02:36 vps200512 sshd\[7682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.214.21
Aug  8 12:02:38 vps200512 sshd\[7682\]: Failed password for invalid user bank from 106.12.214.21 port 41142 ssh2
Aug  8 12:08:49 vps200512 sshd\[7740\]: Invalid user ts3 from 106.12.214.21
Aug  8 12:08:49 vps200512 sshd\[7740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.214.21
2019-08-09 00:09:54
88.247.62.117 attack
Automatic report - Port Scan Attack
2019-08-08 23:24:25
94.23.149.25 attackbotsspam
Aug  8 16:47:03 debian sshd\[28032\]: Invalid user ftpuser from 94.23.149.25 port 46302
Aug  8 16:47:03 debian sshd\[28032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.149.25
...
2019-08-09 00:08:07
218.92.0.191 attackspam
2019-08-08T15:40:31.420012abusebot-8.cloudsearch.cf sshd\[14389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
2019-08-08 23:51:58
14.128.34.34 attack
19/8/8@08:03:46: FAIL: Alarm-Intrusion address from=14.128.34.34
...
2019-08-09 00:07:36
1.119.131.102 attack
Aug  8 16:07:09 ns41 sshd[13472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.131.102
2019-08-08 23:08:39

Recently Reported IPs

207.90.85.237 135.49.112.195 131.170.130.121 127.228.221.254
249.21.65.51 91.56.23.251 220.205.32.228 234.244.11.246
175.52.154.28 241.131.187.245 246.126.112.136 164.115.15.124
180.86.147.198 240.61.99.236 97.149.14.181 164.80.80.43
115.41.43.163 69.249.49.214 108.58.109.130 226.173.114.99