Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Goyang-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
125.142.213.22 attack
Unauthorized connection attempt detected from IP address 125.142.213.22 to port 23
2020-04-13 03:11:11
125.142.213.22 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-19 03:23:23
125.142.249.223 attack
Automatic report - Port Scan Attack
2020-03-08 13:02:32
125.142.251.211 attackspambots
Feb 21 07:37:10 www sshd\[223960\]: Invalid user cpanelconnecttrack from 125.142.251.211
Feb 21 07:37:10 www sshd\[223960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.142.251.211
Feb 21 07:37:12 www sshd\[223960\]: Failed password for invalid user cpanelconnecttrack from 125.142.251.211 port 33564 ssh2
...
2020-02-21 14:04:02
125.142.210.180 attackbots
Dec 23 07:24:14  exim[29394]: [1\41] 1ijH8W-0007e6-69 H=([125.142.210.180]) [125.142.210.180] F= rejected after DATA: This message scored 13.4 spam points.
2019-12-23 21:03:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.142.2.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.142.2.249.			IN	A

;; AUTHORITY SECTION:
.			406	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050103 1800 900 604800 86400

;; Query time: 154 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 06:55:25 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 249.2.142.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.2.142.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
147.78.66.202 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-24 02:06:51
199.195.251.227 attackbots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-23T17:18:55Z
2020-09-24 01:56:22
159.65.84.164 attack
Invalid user openhab from 159.65.84.164 port 37118
2020-09-24 01:45:20
192.119.71.153 attackbots
Phishing
2020-09-24 01:51:00
2.187.37.43 attackspam
Port probing on unauthorized port 445
2020-09-24 01:37:26
67.230.191.105 attack
Sep 23 19:05:17 dev0-dcde-rnet sshd[17128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.230.191.105
Sep 23 19:05:18 dev0-dcde-rnet sshd[17128]: Failed password for invalid user linda from 67.230.191.105 port 38076 ssh2
Sep 23 19:07:56 dev0-dcde-rnet sshd[17163]: Failed password for root from 67.230.191.105 port 45032 ssh2
2020-09-24 01:34:56
192.241.237.209 attack
 TCP (SYN) 192.241.237.209:47203 -> port 18245, len 44
2020-09-24 01:56:36
167.172.46.87 attackspambots
Invalid user user1 from 167.172.46.87 port 43988
2020-09-24 01:47:07
104.131.117.137 attackspambots
Several unsuccessful attempts to access my WordPress server with wrong passwords
2020-09-24 01:30:06
189.110.107.245 attack
...
2020-09-24 01:36:18
124.160.96.249 attackspambots
[f2b] sshd bruteforce, retries: 1
2020-09-24 01:33:33
49.88.112.116 attackbotsspam
Sep 23 19:46:35 rotator sshd\[19311\]: Failed password for root from 49.88.112.116 port 25637 ssh2Sep 23 19:46:37 rotator sshd\[19311\]: Failed password for root from 49.88.112.116 port 25637 ssh2Sep 23 19:46:40 rotator sshd\[19311\]: Failed password for root from 49.88.112.116 port 25637 ssh2Sep 23 19:47:30 rotator sshd\[19318\]: Failed password for root from 49.88.112.116 port 50143 ssh2Sep 23 19:47:33 rotator sshd\[19318\]: Failed password for root from 49.88.112.116 port 50143 ssh2Sep 23 19:47:35 rotator sshd\[19318\]: Failed password for root from 49.88.112.116 port 50143 ssh2
...
2020-09-24 01:54:23
122.154.33.214 attackbotsspam
Unauthorized connection attempt from IP address 122.154.33.214 on Port 445(SMB)
2020-09-24 01:38:19
112.85.42.185 attack
Sep 23 19:53:10 PorscheCustomer sshd[10471]: Failed password for root from 112.85.42.185 port 50576 ssh2
Sep 23 19:54:42 PorscheCustomer sshd[10510]: Failed password for root from 112.85.42.185 port 32048 ssh2
...
2020-09-24 01:57:29
103.74.72.249 attackspam
Unauthorized connection attempt from IP address 103.74.72.249 on Port 445(SMB)
2020-09-24 01:48:08

Recently Reported IPs

5.18.143.5 171.71.250.191 219.183.215.133 102.234.131.79
61.155.80.40 37.229.204.155 210.180.143.185 162.243.143.44
60.119.78.207 77.55.213.36 52.3.248.104 120.40.72.126
166.134.58.235 109.27.182.59 156.224.54.190 189.22.131.248
82.73.153.53 151.34.183.189 17.194.150.8 77.111.32.6