Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Banyuwangi

Region: Jawa Timur

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
125.166.119.28 normal
Test
2021-02-01 12:55:42
125.166.119.252 attackbotsspam
1590810906 - 05/30/2020 05:55:06 Host: 125.166.119.252/125.166.119.252 Port: 445 TCP Blocked
2020-05-30 12:05:01
125.166.119.213 attack
Unauthorized connection attempt from IP address 125.166.119.213 on Port 445(SMB)
2020-04-03 20:11:50
125.166.119.30 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 18:39:32
125.166.119.156 attackspam
Feb 27 23:46:06 h2177944 kernel: \[6041313.244224\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=125.166.119.156 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=54 ID=27179 PROTO=TCP SPT=22391 DPT=23 WINDOW=59870 RES=0x00 SYN URGP=0 
Feb 27 23:46:06 h2177944 kernel: \[6041313.244241\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=125.166.119.156 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=54 ID=27179 PROTO=TCP SPT=22391 DPT=23 WINDOW=59870 RES=0x00 SYN URGP=0 
Feb 27 23:46:22 h2177944 kernel: \[6041329.215531\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=125.166.119.156 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=54 ID=27179 PROTO=TCP SPT=22391 DPT=23 WINDOW=59870 RES=0x00 SYN URGP=0 
Feb 27 23:46:22 h2177944 kernel: \[6041329.215546\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=125.166.119.156 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=54 ID=27179 PROTO=TCP SPT=22391 DPT=23 WINDOW=59870 RES=0x00 SYN URGP=0 
Feb 27 23:46:23 h2177944 kernel: \[6041329.928379\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=125.166.119.156 DST=85.214.117
2020-02-28 08:16:42
125.166.119.214 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 05:02:30
125.166.119.192 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 12:55:17.
2019-10-10 23:22:58
125.166.119.92 attackbots
Unauthorized connection attempt from IP address 125.166.119.92 on Port 445(SMB)
2019-07-22 18:11:34
125.166.119.28 attackbots
445/tcp
[2019-06-22]1pkt
2019-06-22 12:49:14
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '125.166.64.0 - 125.166.127.255'

% Abuse contact for '125.166.64.0 - 125.166.127.255' is 'abuse@telkom.co.id'

inetnum:        125.166.64.0 - 125.166.127.255
netname:        TLKM_D2_BB_SPEEDY_JKT
country:        ID
descr:          PT TELKOM INDONESIA
descr:          Menara Multimedia Lt. 7
descr:          Jl. Kebonsirih No.12
descr:          JAKARTA
admin-c:        AR165-AP
tech-c:         HM444-AP
remarks:        -----------------------------------------------------------
remarks:        Broadband Service for Jakarta Area.
remarks:        ** These IP was used dinamically for end user. **
remarks:        Send ABUSE and SPAM reports with plain ASCII text only to
remarks:        to abuse@telkom.net.id.
remarks:        The netname enclosed in square bracket is included in the subject.
remarks:        -----------------------------------------------------------
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-TELKOMNET
last-modified:  2009-02-13T10:21:22Z
source:         APNIC
mnt-by:         MAINT-TELKOMNET

role:           PT Telkom Indonesia APNIC Resources Management
address:        PT. TELKOM INDONESIA
address:        Menara Multimedia Lt. 7
address:        Jl. Kebonsirih No.12
address:        JAKARTA
country:        ID
phone:          +62-21-3860500
fax-no:         +62-21-3861215
e-mail:         ip-admin@telkom.net.id
admin-c:        HM444-AP
tech-c:         HM444-AP
nic-hdl:        AR165-AP
notify:         hostmaster@telkom.net.id
mnt-by:         MAINT-TELKOMNET
last-modified:  2008-09-04T07:54:16Z
source:         APNIC

person:         PT Telkom Indonesia Hostmaster
nic-hdl:        HM444-AP
e-mail:         hostmaster@telkom.net.id
address:        PT. TELKOM INDONESIA
address:        Menara Multimedia Lt. 7
address:        Jl. Kebonsirih No.12
address:        JAKARTA
phone:          +62-21-3860500
fax-no:         +62-21-3861215
country:        ID
notify:         hostmaster@telkom.net.id
mnt-by:         MAINT-TELKOMNET
last-modified:  2008-09-04T07:29:40Z
source:         APNIC

% Information related to '125.166.116.0/22AS17974'

route:          125.166.116.0/22
descr:          PT. TELKOM INDONESIA
descr:          JAKARTA
country:        ID
origin:         AS17974
mnt-by:         MAINT-TELKOMNET
last-modified:  2015-05-27T03:33:24Z
source:         APNIC

% Information related to '125.166.116.0/22AS7713'

route:          125.166.116.0/22
origin:         AS7713
descr:          Telekomunikasi Indonesia (PT)
                PT Telkom - Divisi Infratel
                Gedung STO Gambir LT 3
                Sub Divisi Resource Management & Operation
                Jalan Merdeka Selatan No .12
mnt-by:         MAINT-TELKOMNET
last-modified:  2021-07-16T02:47:32Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.166.119.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.166.119.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 22 20:04:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 82.119.166.125.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 125.166.119.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
202.183.84.43 attack
Chat Spam
2019-09-01 10:52:35
165.231.13.13 attackbots
DATE:2019-08-31 23:48:17, IP:165.231.13.13, PORT:ssh SSH brute force auth (thor)
2019-09-01 10:29:21
42.200.66.164 attack
Sep  1 02:32:08 server sshd[1387]: Failed password for invalid user moylea from 42.200.66.164 port 48330 ssh2
Sep  1 02:40:38 server sshd[3332]: Failed password for invalid user sirle from 42.200.66.164 port 39634 ssh2
Sep  1 02:45:08 server sshd[4275]: Failed password for root from 42.200.66.164 port 56062 ssh2
2019-09-01 10:46:12
99.149.251.77 attack
Sep  1 04:43:04 SilenceServices sshd[20084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.149.251.77
Sep  1 04:43:06 SilenceServices sshd[20084]: Failed password for invalid user tac from 99.149.251.77 port 33792 ssh2
Sep  1 04:47:54 SilenceServices sshd[22019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.149.251.77
2019-09-01 10:56:25
164.132.192.253 attackspambots
2019-08-31T21:48:29.754582abusebot.cloudsearch.cf sshd\[20407\]: Invalid user console from 164.132.192.253 port 48666
2019-09-01 10:20:38
93.125.99.47 attackspambots
schuetzenmusikanten.de 93.125.99.47 \[31/Aug/2019:23:48:08 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 3563 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
schuetzenmusikanten.de 93.125.99.47 \[31/Aug/2019:23:48:09 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 3563 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
2019-09-01 10:33:42
14.215.46.94 attackspambots
Invalid user user from 14.215.46.94 port 33684
2019-09-01 10:44:05
212.87.9.155 attackspam
Invalid user globalflash from 212.87.9.155 port 32910
2019-09-01 10:37:46
189.51.7.164 attackspam
Unauthorised access (Sep  1) SRC=189.51.7.164 LEN=40 TTL=51 ID=3023 TCP DPT=23 WINDOW=29321 SYN 
Unauthorised access (Aug 30) SRC=189.51.7.164 LEN=40 TTL=51 ID=49336 TCP DPT=23 WINDOW=27281 SYN
2019-09-01 10:12:37
42.115.138.180 attackspam
2019-09-01T11:14:21.578393 [VPS3] sshd[8413]: Invalid user user1 from 42.115.138.180 port 60069
2019-09-01T11:15:36.483332 [VPS3] sshd[8503]: Invalid user mobile from 42.115.138.180 port 31287
2019-09-01T11:15:39.424742 [VPS3] sshd[8509]: Invalid user sanritu-m from 42.115.138.180 port 26015
2019-09-01T11:15:50.851063 [VPS3] sshd[8520]: Invalid user admin from 42.115.138.180 port 50295
2019-09-01T11:15:57.621218 [VPS3] sshd[8531]: Invalid user support from 42.115.138.180 port 25205
2019-09-01T11:16:32.072297 [VPS3] sshd[8577]: Invalid user ftpuser from 42.115.138.180 port 1981
2019-09-01T11:17:01.926604 [VPS3] sshd[8602]: Invalid user sysadmin from 42.115.138.180 port 41314
2019-09-01T11:17:35.959525 [VPS3] sshd[8647]: Invalid user contec from 42.115.138.180 port 41462
2019-09-01T11:18:15.555129 [VPS3] sshd[8701]: Invalid user admin from 42.115.138.180 port 60912
2019-09-01T11:18:17.324085 [VPS3] sshd[8703]: Invalid user sakura from 42.115.138.180 port 36852
2019-09-01 10:34:48
107.170.227.141 attackbotsspam
Aug 31 16:03:54 lcdev sshd\[16586\]: Invalid user rabbitmq from 107.170.227.141
Aug 31 16:03:54 lcdev sshd\[16586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141
Aug 31 16:03:57 lcdev sshd\[16586\]: Failed password for invalid user rabbitmq from 107.170.227.141 port 33310 ssh2
Aug 31 16:08:01 lcdev sshd\[16907\]: Invalid user akhan from 107.170.227.141
Aug 31 16:08:01 lcdev sshd\[16907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141
2019-09-01 10:13:45
178.46.154.48 attack
178.46.154.48 has been banned for [spam]
...
2019-09-01 10:10:49
80.82.70.239 attack
08/31/2019-21:38:02.435749 80.82.70.239 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-01 10:22:10
124.140.124.108 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-09-01 10:43:20
141.98.81.38 attackspam
SSH Bruteforce attack
2019-09-01 10:17:06

Recently Reported IPs

91.92.240.147 191.27.29.55 209.38.208.202 10.88.0.83
194.187.177.215 194.187.177.179 222.186.43.147 47.251.91.69
243.95.40.160 38.95.13.141 103.138.188.183 82.24.64.243
27.115.124.40 74.7.242.14 135.237.126.210 202.62.104.130
103.95.25.240 103.95.24.92 51.254.204.161 45.142.193.88