Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Unauthorized connection attempt from IP address 125.161.104.14 on Port 445(SMB)
2020-01-06 21:22:33
Comments on same subnet:
IP Type Details Datetime
125.161.104.125 attackspam
Unauthorized connection attempt from IP address 125.161.104.125 on Port 445(SMB)
2020-04-29 22:58:09
125.161.104.210 attackbotsspam
1587959766 - 04/27/2020 05:56:06 Host: 125.161.104.210/125.161.104.210 Port: 445 TCP Blocked
2020-04-27 15:04:56
125.161.104.198 attack
$f2bV_matches
2020-03-23 18:35:31
125.161.104.45 attackspambots
445/tcp
[2020-02-19]1pkt
2020-02-19 23:25:12
125.161.104.200 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-12-2019 04:55:08.
2019-12-27 14:28:34
125.161.104.163 attackspam
Unauthorized connection attempt detected from IP address 125.161.104.163 to port 445
2019-12-18 06:45:09
125.161.104.106 attackbotsspam
Unauthorized connection attempt from IP address 125.161.104.106 on Port 445(SMB)
2019-10-26 02:40:08
125.161.104.94 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 17-10-2019 04:45:22.
2019-10-17 19:30:22
125.161.104.197 attackspambots
port scan and connect, tcp 80 (http)
2019-09-22 19:28:43
125.161.104.219 attack
Unauthorized connection attempt from IP address 125.161.104.219 on Port 445(SMB)
2019-08-28 01:39:48
125.161.104.199 attack
Unauthorized connection attempt from IP address 125.161.104.199 on Port 445(SMB)
2019-08-21 11:28:05
125.161.104.198 attackspam
445/tcp
[2019-08-15]1pkt
2019-08-16 12:35:52
125.161.104.11 attackbots
Sat, 20 Jul 2019 21:55:14 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:04:06
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.161.104.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.161.104.14.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010600 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 21:22:27 CST 2020
;; MSG SIZE  rcvd: 118
Host info
14.104.161.125.in-addr.arpa domain name pointer 14.subnet125-161-104.speedy.telkom.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.104.161.125.in-addr.arpa	name = 14.subnet125-161-104.speedy.telkom.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.43.251.153 attackbots
Dovecot Invalid User Login Attempt.
2020-05-09 16:51:22
2.80.168.28 attack
SSH Brute-Force reported by Fail2Ban
2020-05-09 17:15:59
51.75.29.61 attack
May  9 04:49:21 * sshd[11249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.29.61
May  9 04:49:23 * sshd[11249]: Failed password for invalid user csgo from 51.75.29.61 port 48150 ssh2
2020-05-09 17:22:32
103.253.42.41 attackspambots
[Wed May 06 15:20:33 2020] - Syn Flood From IP: 103.253.42.41 Port: 55573
2020-05-09 17:24:41
162.243.144.193 attack
20/5/8@20:31:36: FAIL: Alarm-SSH address from=162.243.144.193
...
2020-05-09 16:56:54
134.122.72.221 attackbots
Automatic report BANNED IP
2020-05-09 17:18:11
198.46.188.145 attackbots
SASL PLAIN auth failed: ruser=...
2020-05-09 16:59:33
180.76.157.150 attack
May  9 04:35:19 minden010 sshd[30019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.157.150
May  9 04:35:21 minden010 sshd[30019]: Failed password for invalid user manager from 180.76.157.150 port 60750 ssh2
May  9 04:39:10 minden010 sshd[31309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.157.150
...
2020-05-09 17:12:27
183.88.240.187 attackbotsspam
SMTP brute force
...
2020-05-09 17:31:03
51.83.57.157 attack
May  9 02:37:17 ncomp sshd[21866]: Invalid user barbary from 51.83.57.157
May  9 02:37:17 ncomp sshd[21866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.57.157
May  9 02:37:17 ncomp sshd[21866]: Invalid user barbary from 51.83.57.157
May  9 02:37:19 ncomp sshd[21866]: Failed password for invalid user barbary from 51.83.57.157 port 38090 ssh2
2020-05-09 16:51:44
106.13.223.100 attackbots
May  9 04:27:19 server sshd[30001]: Failed password for invalid user nfs from 106.13.223.100 port 33180 ssh2
May  9 04:41:12 server sshd[40423]: Failed password for invalid user cui from 106.13.223.100 port 59478 ssh2
May  9 04:45:42 server sshd[44007]: Failed password for invalid user lyq from 106.13.223.100 port 53262 ssh2
2020-05-09 16:53:35
118.70.52.85 attackspam
$f2bV_matches
2020-05-09 17:11:10
185.176.27.102 attack
05/08/2020-22:59:24.757227 185.176.27.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-09 17:00:26
92.63.194.105 attackbots
May  9 01:10:30 XXX sshd[61912]: Invalid user admin from 92.63.194.105 port 39675
2020-05-09 17:31:34
65.49.20.106 attack
Hack Attempt
2020-05-09 17:05:28

Recently Reported IPs

67.178.249.100 156.173.178.215 13.235.188.55 130.67.171.38
114.86.122.206 228.195.43.242 51.205.30.25 49.234.178.155
14.228.133.18 62.205.183.170 157.245.197.65 125.18.30.90
5.227.14.168 113.23.72.49 14.162.170.59 111.119.185.55
159.0.152.202 49.204.226.247 115.214.32.138 223.206.218.89