Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.54.25.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.54.25.149.			IN	A

;; AUTHORITY SECTION:
.			264	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:56:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
149.25.54.119.in-addr.arpa domain name pointer 149.25.54.119.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.25.54.119.in-addr.arpa	name = 149.25.54.119.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.132.83.148 attackspambots
Port probing on unauthorized port 23
2020-02-14 17:25:08
182.61.181.213 attackbots
Automatic report - Banned IP Access
2020-02-14 17:38:23
183.220.146.250 attackspam
Feb 13 23:13:32 auw2 sshd\[2368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.146.250  user=root
Feb 13 23:13:33 auw2 sshd\[2368\]: Failed password for root from 183.220.146.250 port 25756 ssh2
Feb 13 23:17:39 auw2 sshd\[2762\]: Invalid user albert from 183.220.146.250
Feb 13 23:17:39 auw2 sshd\[2762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.146.250
Feb 13 23:17:41 auw2 sshd\[2762\]: Failed password for invalid user albert from 183.220.146.250 port 16406 ssh2
2020-02-14 17:30:47
219.141.184.178 spamattack
Typical blackmail attempt. But instead of the usual "I have a video of you where you visit sex sites", now a new variant. "You mess around with other women and I get your messages from it." And then the usual: The deal is next. You make a donation of $ 950 worth in Bit Coln value. Otherwise, well ... your secret will not be a secret anymore. I created a special archive with some materials for your wife that will be delivered if I don`t get my donation. It took me some time to accumulate enough information. Whoever falls for such shit is to blame. And by the way, if the idiot blackmailer reads this ... I'm not married at all. The blackmail comes via a chinese server again: 183.60.83.19#53(183.60.83.19)
2020-02-14 17:49:18
136.232.4.254 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-14 17:25:52
199.249.230.89 attackbots
Automatic report - Banned IP Access
2020-02-14 17:29:37
178.128.114.106 attackspambots
Invalid user nagios from 178.128.114.106 port 57176
2020-02-14 18:04:59
83.240.245.242 attackbots
Invalid user pgsql from 83.240.245.242 port 40086
2020-02-14 17:27:31
91.230.220.59 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-14 17:36:21
82.213.199.126 attack
Automatic report - Port Scan Attack
2020-02-14 17:52:54
84.109.248.104 attackbots
SSH login attempts.
2020-02-14 17:42:38
119.236.75.140 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 17:52:22
159.226.118.47 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 17:54:17
36.90.1.198 attackspam
Feb 14 05:54:01 localhost sshd\[1882\]: Invalid user nagesh from 36.90.1.198 port 59115
Feb 14 05:54:01 localhost sshd\[1882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.90.1.198
Feb 14 05:54:03 localhost sshd\[1882\]: Failed password for invalid user nagesh from 36.90.1.198 port 59115 ssh2
2020-02-14 17:41:07
223.71.139.98 attackbotsspam
Feb 14 07:56:26 pornomens sshd\[23957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98  user=root
Feb 14 07:56:27 pornomens sshd\[23957\]: Failed password for root from 223.71.139.98 port 33066 ssh2
Feb 14 07:59:48 pornomens sshd\[23971\]: Invalid user lous from 223.71.139.98 port 54210
Feb 14 07:59:48 pornomens sshd\[23971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98
...
2020-02-14 17:58:00

Recently Reported IPs

119.54.244.205 119.54.247.114 119.54.25.100 117.15.95.157
119.54.25.180 119.54.245.8 119.54.25.206 119.54.242.216
119.54.244.127 119.54.25.217 119.54.25.255 119.54.25.55
119.54.26.5 119.54.26.2 119.54.26.119 119.54.27.102
119.54.27.118 119.54.27.132 119.54.26.65 117.15.95.210