Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.125.139.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.125.139.199.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:03:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 199.139.125.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.139.125.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.91.47.186 attackspam
23/tcp
[2019-07-24]1pkt
2019-07-25 04:51:17
203.116.85.254 attackspam
WordPress brute force
2019-07-25 04:50:31
222.186.15.110 attackspam
Jul 24 22:14:18 MainVPS sshd[17002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
Jul 24 22:14:20 MainVPS sshd[17002]: Failed password for root from 222.186.15.110 port 42215 ssh2
Jul 24 22:14:26 MainVPS sshd[17013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
Jul 24 22:14:28 MainVPS sshd[17013]: Failed password for root from 222.186.15.110 port 13979 ssh2
Jul 24 22:14:33 MainVPS sshd[17022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
Jul 24 22:14:35 MainVPS sshd[17022]: Failed password for root from 222.186.15.110 port 38249 ssh2
...
2019-07-25 04:36:53
95.94.232.215 attackbotsspam
NOQUEUE: reject: RCPT from a95-94-232-215.cpe.netcabo.pt\[95.94.232.215\]: 554 5.7.1 Service unavailable\; host \[95.94.232.215\] blocked using sbl-xbl.spamhaus.org\; https://www.spamhaus.org/query/ip/95.94.232.215\;
2019-07-25 04:37:08
45.82.153.6 attackbotsspam
firewall-block, port(s): 5611/tcp
2019-07-25 05:04:24
173.210.171.185 attackbotsspam
BASTARDE !FICKT EUCH !
Jul 24 16:22:42 server plesk_saslauthd[20043]: privileges set to (109:114) (effective 109:114)
Jul 24 16:22:42 server plesk_saslauthd[20043]: No such user 'info@ e' in mail authorization database
Jul 24 16:22:42 server plesk_saslauthd[20043]: failed mail authentication attempt for user 'info@ ' (password len=13)
Jul 24 16:22:42 server postfix/smtpd[20030]: warning: SASL authentication failure: Password verification failed
Jul 24 16:22:42 server postfix/smtpd[20030]: warning: xplr-173-210-171-185.xplornet.com[173.210.171.185]: SASL PLAIN authentication failed: authentication failure
2019-07-25 04:28:15
177.36.58.182 attack
2019-07-24T17:45:02.656349abusebot-2.cloudsearch.cf sshd\[3734\]: Invalid user tan from 177.36.58.182 port 50278
2019-07-25 04:34:49
123.125.71.40 attackspambots
Automatic report - Banned IP Access
2019-07-25 04:35:20
46.162.192.165 attackspambots
scan z
2019-07-25 04:45:02
200.117.185.230 attackbots
Jul 24 15:42:27 aat-srv002 sshd[24308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.117.185.230
Jul 24 15:42:29 aat-srv002 sshd[24308]: Failed password for invalid user francoise from 200.117.185.230 port 4577 ssh2
Jul 24 15:54:14 aat-srv002 sshd[24821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.117.185.230
Jul 24 15:54:17 aat-srv002 sshd[24821]: Failed password for invalid user nagios from 200.117.185.230 port 27201 ssh2
...
2019-07-25 04:57:50
210.217.24.254 attackspambots
Jul 24 20:08:26 sshgateway sshd\[7226\]: Invalid user su from 210.217.24.254
Jul 24 20:08:26 sshgateway sshd\[7226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.217.24.254
Jul 24 20:08:28 sshgateway sshd\[7226\]: Failed password for invalid user su from 210.217.24.254 port 44044 ssh2
2019-07-25 04:22:16
105.159.249.14 attack
81/tcp
[2019-07-24]1pkt
2019-07-25 05:05:39
54.36.182.244 attack
Mar  7 13:25:59 vtv3 sshd\[2675\]: Invalid user openfiler from 54.36.182.244 port 50434
Mar  7 13:25:59 vtv3 sshd\[2675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.182.244
Mar  7 13:26:01 vtv3 sshd\[2675\]: Failed password for invalid user openfiler from 54.36.182.244 port 50434 ssh2
Mar  7 13:32:18 vtv3 sshd\[5034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.182.244  user=root
Mar  7 13:32:20 vtv3 sshd\[5034\]: Failed password for root from 54.36.182.244 port 39503 ssh2
Mar  7 14:41:18 vtv3 sshd\[32191\]: Invalid user xv from 54.36.182.244 port 51572
Mar  7 14:41:18 vtv3 sshd\[32191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.182.244
Mar  7 14:41:20 vtv3 sshd\[32191\]: Failed password for invalid user xv from 54.36.182.244 port 51572 ssh2
Mar  7 14:47:39 vtv3 sshd\[2162\]: Invalid user amavis from 54.36.182.244 port 40597
Mar  7 14:47:39 vtv3 s
2019-07-25 04:43:45
183.80.50.13 attack
22/tcp
[2019-07-24]1pkt
2019-07-25 04:30:40
116.112.181.53 attackbots
Automatic report - Port Scan Attack
2019-07-25 04:52:54

Recently Reported IPs

107.212.137.85 145.236.42.54 35.252.51.58 245.193.160.79
27.75.48.22 97.99.23.234 222.83.198.186 179.218.171.212
33.130.51.229 5.233.188.237 203.245.24.57 231.247.58.115
78.245.175.98 83.196.65.225 14.139.53.66 118.21.107.182
238.9.230.98 147.14.169.230 160.53.211.106 164.37.238.199