Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Williamsville

Region: Illinois

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.125.64.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48061
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.125.64.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081401 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 04:41:32 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 148.64.125.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 148.64.125.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.165.3.1 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-03/07-03]25pkt,1pt.(tcp)
2019-07-04 04:15:15
153.141.134.15 attack
9527/tcp 5555/tcp 5555/tcp
[2019-06-29/07-03]3pkt
2019-07-04 04:35:12
115.78.166.171 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 05:27:14,061 INFO [shellcode_manager] (115.78.166.171) no match, writing hexdump (2d5537ea995991ce5432fbdcaaa6599f :2281214) - MS17010 (EternalBlue)
2019-07-04 03:57:33
212.96.228.65 attackbots
22/tcp 23/tcp
[2019-06-03/07-03]2pkt
2019-07-04 04:38:29
78.186.154.31 attack
23/tcp 81/tcp
[2019-06-10/07-03]2pkt
2019-07-04 04:41:01
71.198.140.17 attackspam
2019-07-03T13:15:28.439952abusebot-2.cloudsearch.cf sshd\[4208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-71-198-140-17.hsd1.ca.comcast.net  user=root
2019-07-04 04:09:15
51.91.18.45 attackspam
" "
2019-07-04 04:12:31
202.29.57.103 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-04 04:33:01
178.46.209.244 attackbotsspam
Brute force SMTP login attempts.
2019-07-04 04:34:38
31.28.163.36 attackspam
HTTP contact form spam
2019-07-04 04:07:35
82.66.61.159 attackbotsspam
...
2019-07-04 04:22:34
151.80.238.201 attack
postfix-failedauth jail [dl]
2019-07-04 04:20:59
83.249.214.251 attackspambots
5555/tcp 23/tcp...
[2019-06-21/07-03]5pkt,2pt.(tcp)
2019-07-04 04:40:09
58.87.120.53 attackspam
Jul  3 18:47:48 unicornsoft sshd\[30392\]: Invalid user minecraft from 58.87.120.53
Jul  3 18:47:48 unicornsoft sshd\[30392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53
Jul  3 18:47:50 unicornsoft sshd\[30392\]: Failed password for invalid user minecraft from 58.87.120.53 port 44600 ssh2
2019-07-04 04:37:29
112.217.225.61 attack
leo_www
2019-07-04 04:23:43

Recently Reported IPs

73.179.183.49 211.253.133.133 94.106.46.206 1.55.156.7
209.136.54.247 109.180.64.25 131.100.81.159 54.79.206.36
183.217.50.70 205.69.31.157 32.86.96.70 131.163.138.24
222.121.205.7 84.201.154.191 177.154.235.157 165.170.191.62
165.22.203.184 125.168.163.24 219.25.85.84 55.242.31.140