Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Netgear DGN Device Remote Command Execution Vulnerability
2019-07-14 22:30:59
Comments on same subnet:
IP Type Details Datetime
125.164.116.119 attack
Honeypot attack, port: 445, PTR: 119.subnet125-164-116.speedy.telkom.net.id.
2020-01-25 07:32:05
125.164.116.119 attackbotsspam
Honeypot attack, port: 445, PTR: 119.subnet125-164-116.speedy.telkom.net.id.
2020-01-20 02:12:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.164.116.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59036
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.164.116.80.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 22:30:35 CST 2019
;; MSG SIZE  rcvd: 118
Host info
80.116.164.125.in-addr.arpa domain name pointer 80.subnet125-164-116.speedy.telkom.net.id.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
80.116.164.125.in-addr.arpa	name = 80.subnet125-164-116.speedy.telkom.net.id.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.72 attack
Jun 30 19:46:05 pkdns2 sshd\[20864\]: Failed password for root from 112.85.42.72 port 45332 ssh2Jun 30 19:46:57 pkdns2 sshd\[20903\]: Failed password for root from 112.85.42.72 port 32305 ssh2Jun 30 19:46:59 pkdns2 sshd\[20903\]: Failed password for root from 112.85.42.72 port 32305 ssh2Jun 30 19:47:01 pkdns2 sshd\[20903\]: Failed password for root from 112.85.42.72 port 32305 ssh2Jun 30 19:53:55 pkdns2 sshd\[21252\]: Failed password for root from 112.85.42.72 port 51916 ssh2Jun 30 19:55:41 pkdns2 sshd\[21385\]: Failed password for root from 112.85.42.72 port 35140 ssh2
...
2020-07-01 06:59:24
185.176.27.34 attackspambots
06/30/2020-12:28:13.916613 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-01 06:12:00
193.112.108.135 attackspam
Jun 30 10:03:12 inter-technics sshd[5763]: Invalid user gj from 193.112.108.135 port 35860
Jun 30 10:03:12 inter-technics sshd[5763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.108.135
Jun 30 10:03:12 inter-technics sshd[5763]: Invalid user gj from 193.112.108.135 port 35860
Jun 30 10:03:14 inter-technics sshd[5763]: Failed password for invalid user gj from 193.112.108.135 port 35860 ssh2
Jun 30 10:09:10 inter-technics sshd[6240]: Invalid user db2inst1 from 193.112.108.135 port 46644
...
2020-07-01 06:48:49
124.173.65.169 attackspam
Invalid user test123 from 124.173.65.169 port 39976
2020-07-01 07:20:49
78.187.41.194 attackbots
Unauthorized connection attempt detected from IP address 78.187.41.194 to port 23
2020-07-01 06:19:42
181.166.87.8 attack
Multiple SSH authentication failures from 181.166.87.8
2020-07-01 06:53:23
185.53.88.236 attackspam
Automatic report - Banned IP Access
2020-07-01 07:05:16
106.12.209.117 attackbots
Jun 30 19:01:21 sip sshd[21720]: Failed password for root from 106.12.209.117 port 55194 ssh2
Jun 30 19:02:25 sip sshd[22095]: Failed password for root from 106.12.209.117 port 35208 ssh2
2020-07-01 07:18:21
109.185.141.61 attackbotsspam
Jun 30 17:29:42 prod4 sshd\[11903\]: Failed password for root from 109.185.141.61 port 48782 ssh2
Jun 30 17:32:55 prod4 sshd\[13266\]: Invalid user sinusbot from 109.185.141.61
Jun 30 17:32:57 prod4 sshd\[13266\]: Failed password for invalid user sinusbot from 109.185.141.61 port 46300 ssh2
...
2020-07-01 06:28:14
68.168.213.252 attackspam
 TCP (SYN) 68.168.213.252:46343 -> port 22, len 44
2020-07-01 06:14:21
85.21.78.213 attackbots
Invalid user family from 85.21.78.213 port 44287
2020-07-01 06:28:48
71.45.233.98 attack
Invalid user testuser from 71.45.233.98 port 32757
2020-07-01 06:55:09
141.98.81.208 attack
Jun 30 19:02:49 debian64 sshd[10698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.208 
Jun 30 19:02:51 debian64 sshd[10698]: Failed password for invalid user Administrator from 141.98.81.208 port 17129 ssh2
...
2020-07-01 06:47:21
212.110.128.210 attackbots
Invalid user finance from 212.110.128.210 port 46620
2020-07-01 06:29:41
167.71.9.180 attackspambots
$f2bV_matches
2020-07-01 06:55:23

Recently Reported IPs

190.226.161.225 100.253.11.83 124.116.217.85 9.157.178.202
119.29.196.109 109.111.212.19 49.86.146.139 118.140.163.178
69.1.40.130 210.41.248.36 2a01:598:a009:8ff6:9571:7ad3:8044:e749 223.212.170.77
45.238.17.112 203.188.50.119 140.90.145.148 150.251.220.185
150.252.239.56 184.160.177.86 14.229.131.73 67.18.113.106