Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
firewall-block, port(s): 8291/tcp
2019-12-05 08:30:32
Comments on same subnet:
IP Type Details Datetime
125.167.85.225 attack
1579063568 - 01/15/2020 05:46:08 Host: 125.167.85.225/125.167.85.225 Port: 445 TCP Blocked
2020-01-15 19:53:10
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.167.85.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.167.85.139.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 08:30:28 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 139.85.167.125.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 139.85.167.125.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
114.239.225.248 attackbotsspam
unauthorized connection attempt
2020-02-19 18:37:34
95.136.10.65 attackbotsspam
unauthorized connection attempt
2020-02-19 18:37:46
202.107.201.232 attackbots
unauthorized connection attempt
2020-02-19 18:08:18
125.227.232.21 attack
Honeypot attack, port: 445, PTR: 125-227-232-21.HINET-IP.hinet.net.
2020-02-19 18:23:01
110.235.202.233 attackspam
unauthorized connection attempt
2020-02-19 18:12:54
177.104.89.191 attackspam
Honeypot attack, port: 81, PTR: power177-104-89-191.powerline.com.br.
2020-02-19 18:36:44
2.85.149.160 attack
unauthorized connection attempt
2020-02-19 18:21:34
195.142.73.154 attackspam
Port probing on unauthorized port 5555
2020-02-19 18:26:30
124.156.55.248 attack
unauthorized connection attempt
2020-02-19 18:34:08
84.78.15.65 attackspambots
unauthorized connection attempt
2020-02-19 18:24:52
18.214.213.60 attack
Feb 19 05:56:07 grey postfix/smtpd\[12666\]: NOQUEUE: reject: RCPT from ec2-18-214-213-60.compute-1.amazonaws.com\[18.214.213.60\]: 554 5.7.1 Service unavailable\; Client host \[18.214.213.60\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[18.214.213.60\]\; from=\ to=\ proto=ESMTP helo=\<7a7ca0a7d67b\>
...
2020-02-19 18:28:02
222.121.246.203 attackbotsspam
unauthorized connection attempt
2020-02-19 18:16:39
189.26.52.204 attackspam
unauthorized connection attempt
2020-02-19 18:28:55
91.132.3.202 attackbots
Port 81 (TorPark onion routing) access denied
2020-02-19 18:32:29
139.162.125.159 attack
unauthorized connection attempt
2020-02-19 18:18:11

Recently Reported IPs

52.167.197.233 213.19.205.124 192.203.230.147 186.125.52.52
242.155.69.83 223.85.205.82 158.162.202.33 220.10.19.131
240.166.205.135 26.67.54.99 144.75.165.78 38.27.108.124
191.143.238.25 154.211.6.87 150.31.63.1 221.204.70.181
108.215.87.147 131.243.218.192 79.121.207.62 197.189.38.53