Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.103.114.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.103.114.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 07:56:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
57.114.103.125.in-addr.arpa domain name pointer 125x103x114x57.ap125.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.114.103.125.in-addr.arpa	name = 125x103x114x57.ap125.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
160.176.120.116 attackbotsspam
Sep  4 18:45:03 mellenthin postfix/smtpd[31059]: NOQUEUE: reject: RCPT from unknown[160.176.120.116]: 554 5.7.1 Service unavailable; Client host [160.176.120.116] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/160.176.120.116; from= to= proto=ESMTP helo=<[160.176.120.116]>
2020-09-05 19:52:44
54.37.14.3 attackspam
Invalid user oracle from 54.37.14.3 port 47988
2020-09-05 20:05:52
45.145.66.96 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 14029 proto: tcp cat: Misc Attackbytes: 60
2020-09-05 19:53:35
1.6.32.35 attackspam
Unauthorized connection attempt from IP address 1.6.32.35 on Port 445(SMB)
2020-09-05 19:40:23
115.238.97.2 attackspambots
Ssh brute force
2020-09-05 19:37:05
111.242.175.97 attackspam
SSH login attempts brute force.
2020-09-05 19:57:00
190.95.40.66 attack
Sep  4 13:45:10 r.ca sshd[25438]: Failed password for root from 190.95.40.66 port 56216 ssh2
2020-09-05 19:58:36
5.55.3.68 attackbotsspam
Sep  4 18:45:20 mellenthin postfix/smtpd[31059]: NOQUEUE: reject: RCPT from ppp005055003068.access.hol.gr[5.55.3.68]: 554 5.7.1 Service unavailable; Client host [5.55.3.68] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/5.55.3.68; from= to= proto=ESMTP helo=
2020-09-05 19:36:42
61.136.184.75 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 51 - port: 28424 proto: tcp cat: Misc Attackbytes: 60
2020-09-05 19:50:09
60.246.192.73 attackspam
Sep  5 00:02:14 vpn01 sshd[14740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.246.192.73
Sep  5 00:02:16 vpn01 sshd[14740]: Failed password for invalid user netman from 60.246.192.73 port 46968 ssh2
...
2020-09-05 20:03:43
51.68.139.151 attack
2020-09-05T12:14:48.868861shield sshd\[25425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.ip-51-68-139.eu  user=root
2020-09-05T12:14:51.150876shield sshd\[25425\]: Failed password for root from 51.68.139.151 port 50406 ssh2
2020-09-05T12:14:54.436420shield sshd\[25425\]: Failed password for root from 51.68.139.151 port 50406 ssh2
2020-09-05T12:14:56.928298shield sshd\[25425\]: Failed password for root from 51.68.139.151 port 50406 ssh2
2020-09-05T12:14:59.971247shield sshd\[25425\]: Failed password for root from 51.68.139.151 port 50406 ssh2
2020-09-05 20:16:50
14.171.48.241 attackspambots
Brute forcing RDP port 3389
2020-09-05 20:06:20
45.142.120.78 attackspam
Sep  5 14:08:16 cho postfix/smtpd[2283406]: warning: unknown[45.142.120.78]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 14:08:56 cho postfix/smtpd[2283406]: warning: unknown[45.142.120.78]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 14:09:35 cho postfix/smtpd[2284325]: warning: unknown[45.142.120.78]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 14:10:13 cho postfix/smtpd[2283406]: warning: unknown[45.142.120.78]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 14:10:53 cho postfix/smtpd[2284763]: warning: unknown[45.142.120.78]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-05 20:11:17
105.112.101.250 attackspambots
Unauthorized connection attempt from IP address 105.112.101.250 on Port 445(SMB)
2020-09-05 19:43:58
138.186.156.84 attack
Unauthorized connection attempt from IP address 138.186.156.84 on Port 445(SMB)
2020-09-05 19:38:57

Recently Reported IPs

116.227.181.213 210.10.126.102 200.30.175.70 121.125.192.233
46.241.42.122 88.62.154.122 50.189.96.209 225.23.93.15
48.127.12.176 176.69.31.234 87.11.223.120 153.23.122.177
69.32.173.45 42.0.182.183 161.5.139.24 9.136.84.3
63.182.43.9 154.117.224.22 152.193.127.201 205.86.5.195