Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Honeypot attack, port: 445, PTR: 67.subnet125-163-134.speedy.telkom.net.id.
2019-09-21 21:01:50
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.163.134.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.163.134.67.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092100 1800 900 604800 86400

;; Query time: 877 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 21 21:01:33 CST 2019
;; MSG SIZE  rcvd: 118
Host info
67.134.163.125.in-addr.arpa domain name pointer 67.subnet125-163-134.speedy.telkom.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.134.163.125.in-addr.arpa	name = 67.subnet125-163-134.speedy.telkom.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.53.52.254 attackspambots
1585738400 - 04/01/2020 12:53:20 Host: 113.53.52.254/113.53.52.254 Port: 445 TCP Blocked
2020-04-01 20:10:32
131.148.31.71 attackbotsspam
Unauthorized connection attempt from IP address 131.148.31.71 on Port 445(SMB)
2020-04-01 19:49:39
46.142.175.55 attack
2020-04-01T03:25:53.935307ionos.janbro.de sshd[26988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.142.175.55  user=root
2020-04-01T03:25:55.356881ionos.janbro.de sshd[26988]: Failed password for root from 46.142.175.55 port 51192 ssh2
2020-04-01T03:32:37.869869ionos.janbro.de sshd[27016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.142.175.55  user=root
2020-04-01T03:32:40.077314ionos.janbro.de sshd[27016]: Failed password for root from 46.142.175.55 port 40832 ssh2
2020-04-01T03:39:25.744213ionos.janbro.de sshd[27027]: Invalid user vagrant from 46.142.175.55 port 58722
2020-04-01T03:39:26.095342ionos.janbro.de sshd[27027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.142.175.55
2020-04-01T03:39:25.744213ionos.janbro.de sshd[27027]: Invalid user vagrant from 46.142.175.55 port 58722
2020-04-01T03:39:28.404745ionos.janbro.de sshd[27027]: Failed pas
...
2020-04-01 19:43:42
114.67.110.88 attackspam
2020-04-01T10:53:41.412005abusebot-8.cloudsearch.cf sshd[29592]: Invalid user icar from 114.67.110.88 port 56446
2020-04-01T10:53:41.419777abusebot-8.cloudsearch.cf sshd[29592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.88
2020-04-01T10:53:41.412005abusebot-8.cloudsearch.cf sshd[29592]: Invalid user icar from 114.67.110.88 port 56446
2020-04-01T10:53:43.006474abusebot-8.cloudsearch.cf sshd[29592]: Failed password for invalid user icar from 114.67.110.88 port 56446 ssh2
2020-04-01T10:57:25.577974abusebot-8.cloudsearch.cf sshd[29779]: Invalid user pw from 114.67.110.88 port 49934
2020-04-01T10:57:25.585027abusebot-8.cloudsearch.cf sshd[29779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.88
2020-04-01T10:57:25.577974abusebot-8.cloudsearch.cf sshd[29779]: Invalid user pw from 114.67.110.88 port 49934
2020-04-01T10:57:27.588427abusebot-8.cloudsearch.cf sshd[29779]: Failed password
...
2020-04-01 19:41:38
185.68.28.239 attackspam
SSH Brute-Forcing (server1)
2020-04-01 19:50:43
157.245.158.214 attackspambots
Apr  1 12:52:12 vmd26974 sshd[2787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.158.214
Apr  1 12:52:14 vmd26974 sshd[2787]: Failed password for invalid user ns from 157.245.158.214 port 42110 ssh2
...
2020-04-01 19:39:05
91.234.62.167 attackspam
Port scan on 1 port(s): 23
2020-04-01 19:35:35
5.116.61.58 attack
Unauthorized connection attempt from IP address 5.116.61.58 on Port 445(SMB)
2020-04-01 20:07:25
187.206.204.203 attack
Unauthorized connection attempt from IP address 187.206.204.203 on Port 445(SMB)
2020-04-01 19:57:44
116.196.79.253 attack
Automatic report - SSH Brute-Force Attack
2020-04-01 19:37:04
58.72.10.2 attackspam
Unauthorized connection attempt from IP address 58.72.10.2 on Port 445(SMB)
2020-04-01 19:52:06
107.170.39.154 attackbotsspam
SSH invalid-user multiple login try
2020-04-01 20:10:50
190.156.231.134 attackbotsspam
Invalid user liyuxuan from 190.156.231.134 port 53042
2020-04-01 19:34:04
36.91.64.65 attackspam
Unauthorized connection attempt from IP address 36.91.64.65 on Port 445(SMB)
2020-04-01 20:14:32
49.233.153.154 attackspambots
Invalid user www from 49.233.153.154 port 41458
2020-04-01 20:10:02

Recently Reported IPs

157.245.221.134 27.212.99.40 212.47.251.164 240.205.235.205
35.241.95.216 208.76.93.128 115.59.30.150 103.231.214.77
188.68.226.102 185.164.2.205 119.28.140.227 183.243.182.103
179.186.212.36 68.84.4.148 113.170.229.154 71.107.236.101
14.168.64.36 94.191.193.216 182.156.80.35 177.223.50.130