Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jeonju

Region: Jeollabuk-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.139.33.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5416
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.139.33.155.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 12:04:36 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 155.33.139.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 155.33.139.125.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
183.88.229.254 attackbotsspam
"SMTP brute force auth login attempt."
2020-01-23 19:58:11
175.198.81.71 attackspambots
Unauthorized connection attempt detected from IP address 175.198.81.71 to port 2220 [J]
2020-01-23 19:51:50
106.13.65.18 attackbots
"SSH brute force auth login attempt."
2020-01-23 19:52:12
62.234.97.45 attackbots
Unauthorized connection attempt detected from IP address 62.234.97.45 to port 2220 [J]
2020-01-23 20:05:22
58.56.114.150 attackspam
"SSH brute force auth login attempt."
2020-01-23 19:49:02
124.161.231.150 attackbotsspam
Unauthorized connection attempt detected from IP address 124.161.231.150 to port 2220 [J]
2020-01-23 19:44:00
106.54.3.80 attackbots
"SSH brute force auth login attempt."
2020-01-23 19:41:55
187.94.134.127 attackbots
"SMTP brute force auth login attempt."
2020-01-23 19:45:59
61.167.99.163 attack
Unauthorized connection attempt detected from IP address 61.167.99.163 to port 2220 [J]
2020-01-23 20:03:10
188.166.228.244 attack
Unauthorized connection attempt detected from IP address 188.166.228.244 to port 2220 [J]
2020-01-23 19:41:24
73.74.189.214 attack
"SSH brute force auth login attempt."
2020-01-23 20:13:08
192.241.249.226 attack
Unauthorized connection attempt detected from IP address 192.241.249.226 to port 2220 [J]
2020-01-23 20:13:20
112.229.182.224 attack
Jan 23 08:50:35 grey postfix/smtpd\[16061\]: NOQUEUE: reject: RCPT from unknown\[112.229.182.224\]: 554 5.7.1 Service unavailable\; Client host \[112.229.182.224\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?112.229.182.224\; from=\ to=\ proto=ESMTP helo=\<\[112.229.182.224\]\>
...
2020-01-23 20:07:38
103.104.232.99 attackspambots
Unauthorized connection attempt detected from IP address 103.104.232.99 to port 2220 [J]
2020-01-23 20:09:09
106.13.8.169 attackspambots
"SSH brute force auth login attempt."
2020-01-23 20:00:37

Recently Reported IPs

183.57.172.252 73.92.104.119 217.89.4.5 163.210.74.47
104.159.138.23 113.58.45.148 47.243.83.198 12.253.164.74
120.46.93.16 63.51.73.67 123.20.213.200 38.223.92.12
167.86.111.59 183.242.179.9 201.108.14.200 176.74.192.36
99.91.31.16 8.232.46.68 201.103.130.30 200.10.107.67