Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.108.117.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44358
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.108.117.53.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031000 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 13:54:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 53.117.108.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.117.108.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.25.96.246 attack
Aug 10 09:50:32 powerpi2 sshd[25038]: Failed password for root from 118.25.96.246 port 56790 ssh2
Aug 10 09:55:24 powerpi2 sshd[25295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.96.246  user=root
Aug 10 09:55:27 powerpi2 sshd[25295]: Failed password for root from 118.25.96.246 port 52284 ssh2
...
2020-08-10 18:04:40
101.89.145.133 attack
Aug 10 00:32:56 v26 sshd[18883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.145.133  user=r.r
Aug 10 00:32:58 v26 sshd[18883]: Failed password for r.r from 101.89.145.133 port 37722 ssh2
Aug 10 00:32:58 v26 sshd[18883]: Received disconnect from 101.89.145.133 port 37722:11: Bye Bye [preauth]
Aug 10 00:32:58 v26 sshd[18883]: Disconnected from 101.89.145.133 port 37722 [preauth]
Aug 10 00:56:02 v26 sshd[21726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.145.133  user=r.r
Aug 10 00:56:04 v26 sshd[21726]: Failed password for r.r from 101.89.145.133 port 34482 ssh2
Aug 10 00:56:04 v26 sshd[21726]: Received disconnect from 101.89.145.133 port 34482:11: Bye Bye [preauth]
Aug 10 00:56:04 v26 sshd[21726]: Disconnected from 101.89.145.133 port 34482 [preauth]
Aug 10 00:59:47 v26 sshd[22111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2020-08-10 18:32:32
95.110.129.91 attackbotsspam
95.110.129.91 - - [10/Aug/2020:09:37:31 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.110.129.91 - - [10/Aug/2020:09:37:31 +0200] "POST /wp-login.php HTTP/1.1" 200 1811 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.110.129.91 - - [10/Aug/2020:09:37:32 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.110.129.91 - - [10/Aug/2020:09:37:32 +0200] "POST /wp-login.php HTTP/1.1" 200 1790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.110.129.91 - - [10/Aug/2020:09:37:32 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.110.129.91 - - [10/Aug/2020:09:37:33 +0200] "POST /wp-login.php HTTP/1.1" 200 1790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir
...
2020-08-10 18:03:57
194.26.25.8 attack
 TCP (SYN) 194.26.25.8:58174 -> port 33907, len 44
2020-08-10 18:38:48
195.225.49.131 attackbots
Aug 10 11:08:14 our-server-hostname postfix/smtpd[5747]: connect from unknown[195.225.49.131]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=195.225.49.131
2020-08-10 18:21:30
221.148.45.168 attack
Aug 10 10:14:32 game-panel sshd[13856]: Failed password for root from 221.148.45.168 port 40763 ssh2
Aug 10 10:18:25 game-panel sshd[13980]: Failed password for root from 221.148.45.168 port 42021 ssh2
2020-08-10 18:38:21
49.235.192.120 attack
Aug 10 08:50:39 game-panel sshd[10622]: Failed password for root from 49.235.192.120 port 43401 ssh2
Aug 10 08:54:12 game-panel sshd[10800]: Failed password for root from 49.235.192.120 port 7250 ssh2
2020-08-10 18:05:00
183.178.63.51 attack
[portscan] tcp/23 [TELNET]
*(RWIN=5032)(08101043)
2020-08-10 18:34:56
34.86.139.183 attackbotsspam
2020-08-10T12:23:52.905798centos sshd[23771]: Failed password for root from 34.86.139.183 port 51950 ssh2
2020-08-10T12:25:50.807431centos sshd[24096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.86.139.183  user=root
2020-08-10T12:25:53.185048centos sshd[24096]: Failed password for root from 34.86.139.183 port 36228 ssh2
...
2020-08-10 18:36:24
61.12.67.133 attack
2020-08-10T10:10:00.081054centos sshd[2602]: Failed password for root from 61.12.67.133 port 50471 ssh2
2020-08-10T10:14:19.212285centos sshd[3344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.67.133  user=root
2020-08-10T10:14:21.626023centos sshd[3344]: Failed password for root from 61.12.67.133 port 18102 ssh2
...
2020-08-10 18:10:32
49.233.58.73 attackspambots
Aug 10 11:28:45 ip106 sshd[16719]: Failed password for root from 49.233.58.73 port 32914 ssh2
...
2020-08-10 18:42:12
42.200.168.163 attackspam
Hits on port : 445
2020-08-10 18:41:19
184.105.247.219 attackspam
" "
2020-08-10 18:40:21
185.97.116.109 attackspambots
Aug 10 03:53:49 vm0 sshd[8881]: Failed password for root from 185.97.116.109 port 52378 ssh2
Aug 10 09:44:50 vm0 sshd[2623]: Failed password for root from 185.97.116.109 port 39988 ssh2
...
2020-08-10 18:28:45
106.12.29.123 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-10 18:33:01

Recently Reported IPs

125.108.117.49 125.108.117.62 125.108.117.68 125.108.117.74
125.108.117.8 125.108.117.80 125.108.117.87 125.108.117.90
125.108.117.93 125.108.117.94 125.108.117.96 125.108.118.103
125.108.118.112 125.108.118.114 125.108.118.121 125.108.118.126
125.108.118.131 125.108.118.141 125.108.118.145 125.108.118.149