Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.102.145.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.102.145.197.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 11:16:25 CST 2025
;; MSG SIZE  rcvd: 108
Host info
197.145.102.125.in-addr.arpa domain name pointer 125x102x145x197.ap125.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.145.102.125.in-addr.arpa	name = 125x102x145x197.ap125.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.229.211.66 attackbotsspam
Invalid user zl from 111.229.211.66 port 35322
2020-08-22 15:15:33
222.186.42.213 attackbotsspam
Aug 22 09:36:47 eventyay sshd[12255]: Failed password for root from 222.186.42.213 port 25550 ssh2
Aug 22 09:36:59 eventyay sshd[12258]: Failed password for root from 222.186.42.213 port 31358 ssh2
...
2020-08-22 15:38:19
112.85.42.176 attackbotsspam
Aug 22 09:18:13 ovpn sshd\[15998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Aug 22 09:18:15 ovpn sshd\[15998\]: Failed password for root from 112.85.42.176 port 22054 ssh2
Aug 22 09:18:19 ovpn sshd\[15998\]: Failed password for root from 112.85.42.176 port 22054 ssh2
Aug 22 09:18:33 ovpn sshd\[16089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Aug 22 09:18:36 ovpn sshd\[16089\]: Failed password for root from 112.85.42.176 port 57700 ssh2
2020-08-22 15:20:37
51.255.35.41 attack
Invalid user tiziano from 51.255.35.41 port 48745
2020-08-22 15:25:36
14.231.199.2 attack
1598068343 - 08/22/2020 05:52:23 Host: 14.231.199.2/14.231.199.2 Port: 445 TCP Blocked
2020-08-22 15:00:17
92.222.90.130 attackspam
Aug 22 06:59:46 game-panel sshd[32234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.90.130
Aug 22 06:59:48 game-panel sshd[32234]: Failed password for invalid user omar from 92.222.90.130 port 46668 ssh2
Aug 22 07:03:43 game-panel sshd[32426]: Failed password for root from 92.222.90.130 port 54178 ssh2
2020-08-22 15:08:49
139.186.69.133 attackbotsspam
Aug 22 06:33:25 vmd36147 sshd[23466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.69.133
Aug 22 06:33:27 vmd36147 sshd[23466]: Failed password for invalid user vod from 139.186.69.133 port 58592 ssh2
Aug 22 06:38:25 vmd36147 sshd[1715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.69.133
...
2020-08-22 14:59:13
113.164.244.38 attackspambots
20/8/21@23:51:46: FAIL: Alarm-Network address from=113.164.244.38
...
2020-08-22 15:26:44
119.90.61.10 attackbotsspam
Aug 22 07:15:24 django-0 sshd[32320]: Invalid user dropbox from 119.90.61.10
Aug 22 07:15:26 django-0 sshd[32320]: Failed password for invalid user dropbox from 119.90.61.10 port 53828 ssh2
Aug 22 07:23:13 django-0 sshd[32468]: Invalid user ts3 from 119.90.61.10
...
2020-08-22 15:24:19
181.129.52.98 attackbotsspam
$f2bV_matches
2020-08-22 15:14:11
212.107.238.101 attack
Dovecot Invalid User Login Attempt.
2020-08-22 15:12:06
186.178.47.164 attackbotsspam
notenschluessel-fulda.de 186.178.47.164 [22/Aug/2020:05:51:32 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4336 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
notenschluessel-fulda.de 186.178.47.164 [22/Aug/2020:05:51:37 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4336 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-08-22 15:31:00
161.35.69.152 attackbots
161.35.69.152 - - [22/Aug/2020:05:52:22 +0200] "GET /wp-login.php HTTP/1.1" 200 8775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.69.152 - - [22/Aug/2020:05:52:22 +0200] "POST /wp-login.php HTTP/1.1" 200 9026 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.69.152 - - [22/Aug/2020:05:52:23 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-22 14:58:50
51.75.140.153 attackspam
Invalid user vnc from 51.75.140.153 port 41050
2020-08-22 15:04:42
65.191.76.227 attack
Aug 22 09:29:06 hosting sshd[24143]: Invalid user hduser from 65.191.76.227 port 59282
...
2020-08-22 14:57:28

Recently Reported IPs

231.198.245.66 70.162.27.192 97.196.17.164 178.131.146.185
174.11.57.118 255.240.14.85 26.80.81.58 152.212.15.41
129.207.106.178 131.137.143.81 177.48.163.146 65.74.28.235
225.174.71.60 148.210.154.86 188.133.55.222 207.40.24.31
201.233.111.216 94.119.224.51 239.122.201.31 211.1.195.72