Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.123.140.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 642
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.123.140.161.		IN	A

;; AUTHORITY SECTION:
.			240	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 02:18:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 161.140.123.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.140.123.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.254.137.206 attack
2020-06-01T12:20:47.839004shield sshd\[30788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.ip-51-254-137.eu  user=root
2020-06-01T12:20:49.664750shield sshd\[30788\]: Failed password for root from 51.254.137.206 port 44255 ssh2
2020-06-01T12:22:05.126598shield sshd\[31224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.ip-51-254-137.eu  user=root
2020-06-01T12:22:06.986815shield sshd\[31224\]: Failed password for root from 51.254.137.206 port 56926 ssh2
2020-06-01T12:23:23.551173shield sshd\[31707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.ip-51-254-137.eu  user=root
2020-06-01 20:35:04
138.68.92.121 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-06-01 20:35:32
101.100.129.171 attackbotsspam
2019-07-08 00:17:37 1hkFTU-0004DI-8a SMTP connection from \(101-100-129-171.myrepublic.co.nz\) \[101.100.129.171\]:11514 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 00:17:45 1hkFTc-0004DR-1S SMTP connection from \(101-100-129-171.myrepublic.co.nz\) \[101.100.129.171\]:11498 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 00:17:52 1hkFTi-0004DV-IC SMTP connection from \(101-100-129-171.myrepublic.co.nz\) \[101.100.129.171\]:11570 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 21:11:27
201.158.2.118 attack
Jun  1 14:05:36 vpn01 sshd[10624]: Failed password for root from 201.158.2.118 port 48235 ssh2
...
2020-06-01 20:57:02
94.23.38.191 attackbots
Jun  1 14:07:48 ourumov-web sshd\[15243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.38.191  user=root
Jun  1 14:07:50 ourumov-web sshd\[15243\]: Failed password for root from 94.23.38.191 port 56856 ssh2
Jun  1 14:11:07 ourumov-web sshd\[15548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.38.191  user=root
...
2020-06-01 20:44:08
101.101.19.47 attackbots
2019-06-22 08:16:15 1heZJp-0004tP-PB SMTP connection from \(\[101.101.19.47\]\) \[101.101.19.47\]:33235 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 08:16:46 1heZKM-0004tz-VL SMTP connection from \(\[101.101.19.47\]\) \[101.101.19.47\]:33235 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 08:17:15 1heZKn-0004uT-Tq SMTP connection from \(\[101.101.19.47\]\) \[101.101.19.47\]:33235 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 20:58:55
195.54.160.225 attack
scans 12 times in preceeding hours on the ports (in chronological order) 4485 4499 4476 4469 4467 4477 4458 4455 4475 4472 4494 4453
2020-06-01 20:33:20
106.12.24.225 attackspam
Jun  1 02:33:58 serwer sshd\[311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.225  user=root
Jun  1 02:34:00 serwer sshd\[311\]: Failed password for root from 106.12.24.225 port 46984 ssh2
Jun  1 02:37:08 serwer sshd\[753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.225  user=root
Jun  1 02:37:11 serwer sshd\[753\]: Failed password for root from 106.12.24.225 port 60098 ssh2
Jun  1 02:40:14 serwer sshd\[1274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.225  user=root
Jun  1 02:40:16 serwer sshd\[1274\]: Failed password for root from 106.12.24.225 port 44974 ssh2
Jun  1 02:43:09 serwer sshd\[1529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.225  user=root
Jun  1 02:43:12 serwer sshd\[1529\]: Failed password for root from 106.12.24.225 port 58080 ssh2
Jun 
...
2020-06-01 20:52:11
106.13.73.210 attackbots
Jun  1 13:51:39 pornomens sshd\[17077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210  user=root
Jun  1 13:51:42 pornomens sshd\[17077\]: Failed password for root from 106.13.73.210 port 48568 ssh2
Jun  1 14:09:25 pornomens sshd\[17285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210  user=root
...
2020-06-01 20:51:42
106.12.29.220 attackspam
May 31 19:50:17 serwer sshd\[22707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.29.220  user=root
May 31 19:50:18 serwer sshd\[22707\]: Failed password for root from 106.12.29.220 port 58768 ssh2
May 31 19:58:02 serwer sshd\[23331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.29.220  user=root
May 31 19:58:03 serwer sshd\[23331\]: Failed password for root from 106.12.29.220 port 43020 ssh2
May 31 20:00:36 serwer sshd\[23698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.29.220  user=root
May 31 20:00:38 serwer sshd\[23698\]: Failed password for root from 106.12.29.220 port 48232 ssh2
May 31 20:03:08 serwer sshd\[23915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.29.220  user=root
May 31 20:03:09 serwer sshd\[23915\]: Failed password for root from 106.12.29.220 port 534
...
2020-06-01 20:41:03
124.93.222.211 attack
Jun  1 14:05:16 pornomens sshd\[17243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.93.222.211  user=root
Jun  1 14:05:18 pornomens sshd\[17243\]: Failed password for root from 124.93.222.211 port 43828 ssh2
Jun  1 14:09:42 pornomens sshd\[17297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.93.222.211  user=root
...
2020-06-01 20:37:22
185.121.69.37 attackspam
WordPress XML-RPC attack.
2020-06-01 20:40:48
68.183.19.84 attack
Jun  1 13:48:28 icinga sshd[39077]: Failed password for root from 68.183.19.84 port 46256 ssh2
Jun  1 14:03:33 icinga sshd[63671]: Failed password for root from 68.183.19.84 port 38510 ssh2
...
2020-06-01 20:45:17
217.160.214.48 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-01 21:04:10
159.203.30.50 attack
Jun  1 08:21:03 ny01 sshd[12036]: Failed password for root from 159.203.30.50 port 36862 ssh2
Jun  1 08:24:48 ny01 sshd[12492]: Failed password for root from 159.203.30.50 port 40900 ssh2
2020-06-01 20:38:29

Recently Reported IPs

125.123.140.157 125.123.140.162 125.123.140.165 117.70.40.52
125.123.140.172 125.123.140.17 125.123.140.167 125.123.140.168
125.123.140.175 125.123.140.179 125.123.140.18 125.123.140.182
125.123.140.185 125.123.140.186 125.123.140.177 125.123.140.188
117.70.40.54 125.123.140.194 125.123.140.192 125.123.140.196