Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.157.140.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.157.140.144.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 01:59:59 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 144.140.157.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.140.157.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.85.215.197 attack
Received: from 209.85.215.197 (EHLO mail-pg1-f197.google.com)
2020-08-04 14:17:49
113.161.79.191 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-04 14:36:05
103.89.176.74 attack
Aug  4 07:16:57 server sshd[12940]: Failed password for root from 103.89.176.74 port 44330 ssh2
Aug  4 07:20:39 server sshd[18735]: Failed password for root from 103.89.176.74 port 41716 ssh2
Aug  4 07:24:25 server sshd[24353]: Failed password for root from 103.89.176.74 port 39102 ssh2
2020-08-04 14:15:24
45.4.168.57 attack
Aug  3 22:55:31 mailman postfix/smtpd[2703]: warning: unknown[45.4.168.57]: SASL PLAIN authentication failed: authentication failure
2020-08-04 14:46:04
106.13.95.100 attackbots
Aug  4 06:07:34 abendstille sshd\[16573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.95.100  user=root
Aug  4 06:07:37 abendstille sshd\[16573\]: Failed password for root from 106.13.95.100 port 35730 ssh2
Aug  4 06:09:25 abendstille sshd\[18729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.95.100  user=root
Aug  4 06:09:28 abendstille sshd\[18729\]: Failed password for root from 106.13.95.100 port 58708 ssh2
Aug  4 06:11:26 abendstille sshd\[20745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.95.100  user=root
...
2020-08-04 14:27:18
49.233.28.240 attackbotsspam
Aug  4 05:09:58 rocket sshd[6387]: Failed password for root from 49.233.28.240 port 55632 ssh2
Aug  4 05:14:40 rocket sshd[7533]: Failed password for root from 49.233.28.240 port 60118 ssh2
...
2020-08-04 14:40:12
1.202.118.111 attackbotsspam
2020-08-03 01:46:15 server sshd[99544]: Failed password for invalid user root from 1.202.118.111 port 52514 ssh2
2020-08-04 14:33:19
45.129.33.12 attackbots
08/04/2020-02:15:54.257653 45.129.33.12 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-04 14:20:31
157.245.231.62 attackspam
Aug  4 07:15:02 server sshd[10109]: Failed password for root from 157.245.231.62 port 41072 ssh2
Aug  4 07:18:56 server sshd[15939]: Failed password for root from 157.245.231.62 port 52410 ssh2
Aug  4 07:22:48 server sshd[21917]: Failed password for root from 157.245.231.62 port 35516 ssh2
2020-08-04 14:12:37
112.85.42.186 attackspam
Aug  4 11:48:23 dhoomketu sshd[2143393]: Failed password for root from 112.85.42.186 port 53773 ssh2
Aug  4 11:49:17 dhoomketu sshd[2143407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Aug  4 11:49:19 dhoomketu sshd[2143407]: Failed password for root from 112.85.42.186 port 18881 ssh2
Aug  4 11:50:17 dhoomketu sshd[2143425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Aug  4 11:50:20 dhoomketu sshd[2143425]: Failed password for root from 112.85.42.186 port 44866 ssh2
...
2020-08-04 14:25:51
124.156.132.183 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-04 14:46:20
40.118.226.96 attackspam
$f2bV_matches
2020-08-04 14:21:01
212.129.152.27 attackspambots
Aug  4 05:49:37 marvibiene sshd[18918]: Failed password for root from 212.129.152.27 port 57738 ssh2
2020-08-04 14:23:33
181.46.193.151 attackspam
20/8/3@23:56:16: FAIL: Alarm-Network address from=181.46.193.151
...
2020-08-04 14:22:28
111.229.240.102 attackspambots
Aug  4 05:07:58 django-0 sshd[11582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.240.102  user=root
Aug  4 05:08:00 django-0 sshd[11582]: Failed password for root from 111.229.240.102 port 50352 ssh2
...
2020-08-04 14:13:14

Recently Reported IPs

167.99.125.127 234.91.50.19 246.58.153.254 209.63.89.148
137.201.106.211 202.147.29.83 198.107.164.184 135.56.97.130
197.50.132.244 245.14.173.200 208.183.95.141 244.145.42.81
174.10.25.135 71.200.37.209 159.34.63.72 13.45.6.130
121.206.40.145 169.127.248.110 219.105.178.142 207.56.175.188