Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.108.97.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.108.97.30.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 14:35:04 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 30.97.108.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.97.108.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.249.64.194 attack
Automatic report - Banned IP Access
2019-11-06 18:23:01
185.142.236.34 attack
185.142.236.34 was recorded 8 times by 7 hosts attempting to connect to the following ports: 6000,9191,179,12345,2222,2086,4443,1400. Incident counter (4h, 24h, all-time): 8, 34, 102
2019-11-06 18:55:33
192.3.70.113 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: 192-3-70-113-host.colocrossing.com.
2019-11-06 18:35:19
222.186.175.161 attackspambots
Nov  6 11:32:00 dedicated sshd[16318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
Nov  6 11:32:02 dedicated sshd[16318]: Failed password for root from 222.186.175.161 port 21994 ssh2
2019-11-06 18:32:58
45.143.220.14 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-06 18:28:32
117.216.130.109 attackbots
Unauthorised access (Nov  6) SRC=117.216.130.109 LEN=52 PREC=0x20 TTL=110 ID=23281 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-06 18:54:12
106.13.120.176 attackbotsspam
2019-11-06T10:37:17.853497abusebot-3.cloudsearch.cf sshd\[32707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.120.176  user=root
2019-11-06 18:46:23
66.50.11.146 attack
Automatic report - Port Scan Attack
2019-11-06 18:52:03
70.71.148.228 attack
Nov  6 01:56:04 ny01 sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.71.148.228
Nov  6 01:56:06 ny01 sshd[5855]: Failed password for invalid user tinashe from 70.71.148.228 port 46909 ssh2
Nov  6 01:59:59 ny01 sshd[6415]: Failed password for root from 70.71.148.228 port 38046 ssh2
2019-11-06 18:15:39
43.228.221.163 attack
Unauthorised access (Nov  6) SRC=43.228.221.163 LEN=52 TTL=112 ID=6258 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-06 18:39:02
178.33.45.156 attack
Nov  6 10:48:26 minden010 sshd[1750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.45.156
Nov  6 10:48:29 minden010 sshd[1750]: Failed password for invalid user kim1968 from 178.33.45.156 port 54398 ssh2
Nov  6 10:52:07 minden010 sshd[3117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.45.156
...
2019-11-06 18:22:24
59.91.218.77 attack
[06/Nov/2019:07:25:49 +0100] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
[06/Nov/2019:07:25:55 +0100] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-11-06 18:17:29
198.245.63.94 attack
Nov  6 13:31:08 server sshd\[23632\]: Invalid user wkidup from 198.245.63.94
Nov  6 13:31:08 server sshd\[23632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns508619.ip-198-245-63.net 
Nov  6 13:31:10 server sshd\[23632\]: Failed password for invalid user wkidup from 198.245.63.94 port 50024 ssh2
Nov  6 13:45:30 server sshd\[27614\]: Invalid user odoo from 198.245.63.94
Nov  6 13:45:30 server sshd\[27614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns508619.ip-198-245-63.net 
...
2019-11-06 18:53:13
123.207.108.89 attack
Nov  6 11:19:07 server sshd\[21587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.108.89  user=root
Nov  6 11:19:09 server sshd\[21587\]: Failed password for root from 123.207.108.89 port 53612 ssh2
Nov  6 11:29:44 server sshd\[24159\]: Invalid user muhammad from 123.207.108.89
Nov  6 11:29:44 server sshd\[24159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.108.89 
Nov  6 11:29:46 server sshd\[24159\]: Failed password for invalid user muhammad from 123.207.108.89 port 34398 ssh2
...
2019-11-06 18:19:49
185.153.199.118 attack
Microsoft Windows Terminal server RDP over non-standard port attempt - 235
2019-11-06 18:23:30

Recently Reported IPs

125.108.97.3 125.108.97.36 125.108.97.71 125.108.98.7
125.108.99.48 125.108.99.6 125.108.99.62 125.108.99.64
125.108.99.68 125.108.99.73 125.108.99.8 125.108.99.80
125.108.99.83 125.108.99.85 125.108.99.87 125.108.99.91
125.108.99.92 125.109.125.38 125.109.133.110 125.109.141.40