Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
125.164.116.119 attack
Honeypot attack, port: 445, PTR: 119.subnet125-164-116.speedy.telkom.net.id.
2020-01-25 07:32:05
125.164.116.119 attackbotsspam
Honeypot attack, port: 445, PTR: 119.subnet125-164-116.speedy.telkom.net.id.
2020-01-20 02:12:26
125.164.112.186 attackbotsspam
Unauthorized connection attempt from IP address 125.164.112.186 on Port 445(SMB)
2020-01-07 23:28:09
125.164.11.198 attack
Unauthorized connection attempt detected from IP address 125.164.11.198 to port 445
2019-12-12 21:51:24
125.164.11.92 attackspam
" "
2019-11-23 05:59:44
125.164.114.149 attackbotsspam
Unauthorized connection attempt from IP address 125.164.114.149 on Port 445(SMB)
2019-08-31 16:00:43
125.164.116.80 attackspam
Netgear DGN Device Remote Command Execution Vulnerability
2019-07-14 22:30:59
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.164.11.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.164.11.137.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:26:42 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 137.11.164.125.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 125.164.11.137.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
1.169.21.81 attackbotsspam
Port Scan: TCP/23
2019-08-05 08:32:24
74.43.119.66 attack
Port Scan: TCP/445
2019-08-05 08:57:27
213.8.24.30 attackbots
Port Scan: TCP/445
2019-08-05 09:09:14
36.226.254.69 attackbotsspam
Port Scan: TCP/23
2019-08-05 09:05:25
156.220.173.4 attackbots
Port Scan: TCP/23
2019-08-05 08:45:18
46.3.96.66 attackbots
08/04/2019-20:41:45.253891 46.3.96.66 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 39
2019-08-05 09:01:56
208.123.130.60 attackbotsspam
Port Scan: UDP/137
2019-08-05 09:10:13
203.195.200.135 attackspam
Port Scan: TCP/445
2019-08-05 08:35:57
185.175.93.25 attackspambots
firewall-block, port(s): 5888/tcp
2019-08-05 08:38:41
211.103.212.98 attackbots
Port Scan: UDP/49153
2019-08-05 09:09:56
91.230.25.68 attackbotsspam
Autoban   91.230.25.68 AUTH/CONNECT
2019-08-05 08:54:08
208.85.7.138 attackbots
Port Scan: TCP/445
2019-08-05 09:10:46
212.119.77.232 attack
Port Scan: TCP/23
2019-08-05 09:09:32
118.169.46.194 attack
Port Scan: TCP/23
2019-08-05 08:48:53
5.128.152.227 attackbots
Port Scan: TCP/23
2019-08-05 09:07:43

Recently Reported IPs

125.164.132.159 125.163.66.18 125.164.119.243 125.164.14.152
125.164.16.32 125.164.226.125 125.164.143.238 125.164.241.11
125.164.235.249 125.164.21.228 125.164.10.147 125.164.59.26
125.164.98.159 125.164.221.12 125.165.107.82 125.165.1.205
125.165.117.142 125.165.119.3 125.165.198.123 125.165.110.10