Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seongbuk-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.188.29.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.188.29.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 13:08:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.29.188.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.29.188.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.29.213 attack
104.248.29.213 - - [27/Apr/2020:05:55:29 +0200] "GET /wp-login.php HTTP/1.1" 200 5863 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.29.213 - - [27/Apr/2020:05:55:35 +0200] "POST /wp-login.php HTTP/1.1" 200 6168 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.29.213 - - [27/Apr/2020:05:55:36 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-27 15:27:21
46.189.174.240 attack
Apr 27 03:54:51 hermescis postfix/smtpd[21487]: NOQUEUE: reject: RCPT from 240.174.189.46.rev.vodafone.pt[46.189.174.240]: 550 5.1.1 : Recipient address rejected:* from= to= proto=ESMTP helo=<240.174.189.46.rev.vodafone.pt>
2020-04-27 15:57:30
195.231.0.89 attack
Apr 27 08:21:26 meumeu sshd[2261]: Failed password for root from 195.231.0.89 port 33606 ssh2
Apr 27 08:25:17 meumeu sshd[2779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.0.89 
Apr 27 08:25:19 meumeu sshd[2779]: Failed password for invalid user tang from 195.231.0.89 port 52696 ssh2
...
2020-04-27 15:29:55
99.241.126.85 attackbotsspam
CA_Rogers_<177>1587973476 [1:2403492:56948] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 97 [Classification: Misc Attack] [Priority: 2]:  {TCP} 99.241.126.85:22584
2020-04-27 15:50:45
209.59.143.230 attackspam
Apr 26 21:50:04 web1 sshd\[14998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.59.143.230  user=root
Apr 26 21:50:06 web1 sshd\[14998\]: Failed password for root from 209.59.143.230 port 51840 ssh2
Apr 26 21:51:29 web1 sshd\[15155\]: Invalid user kamal from 209.59.143.230
Apr 26 21:51:29 web1 sshd\[15155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.59.143.230
Apr 26 21:51:31 web1 sshd\[15155\]: Failed password for invalid user kamal from 209.59.143.230 port 55907 ssh2
2020-04-27 15:59:24
178.161.144.50 attack
Apr 27 08:41:33 Ubuntu-1404-trusty-64-minimal sshd\[17785\]: Invalid user lko from 178.161.144.50
Apr 27 08:41:33 Ubuntu-1404-trusty-64-minimal sshd\[17785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.161.144.50
Apr 27 08:41:35 Ubuntu-1404-trusty-64-minimal sshd\[17785\]: Failed password for invalid user lko from 178.161.144.50 port 55356 ssh2
Apr 27 08:43:19 Ubuntu-1404-trusty-64-minimal sshd\[18971\]: Invalid user pearson from 178.161.144.50
Apr 27 08:43:19 Ubuntu-1404-trusty-64-minimal sshd\[18971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.161.144.50
2020-04-27 15:35:00
178.128.150.158 attack
$f2bV_matches
2020-04-27 15:42:27
77.37.162.17 attack
Invalid user qf from 77.37.162.17 port 53096
2020-04-27 15:33:02
195.154.133.163 attackbots
195.154.133.163 - - [27/Apr/2020:11:36:37 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-04-27 15:43:52
222.186.30.167 attackspam
Fail2Ban Ban Triggered
2020-04-27 15:30:34
218.92.0.204 attackspambots
Unauthorized connection attempt detected from IP address 218.92.0.204 to port 22 [T]
2020-04-27 15:43:27
45.116.229.245 attackspambots
failed_logins
2020-04-27 15:42:05
51.91.111.73 attackspambots
Apr 27 09:20:48 srv01 sshd[25684]: Invalid user developer from 51.91.111.73 port 54676
Apr 27 09:20:48 srv01 sshd[25684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.111.73
Apr 27 09:20:48 srv01 sshd[25684]: Invalid user developer from 51.91.111.73 port 54676
Apr 27 09:20:50 srv01 sshd[25684]: Failed password for invalid user developer from 51.91.111.73 port 54676 ssh2
Apr 27 09:24:43 srv01 sshd[25966]: Invalid user odroid from 51.91.111.73 port 38298
...
2020-04-27 15:38:12
120.92.164.236 attackspambots
Apr 27 08:57:56 prox sshd[11181]: Failed password for root from 120.92.164.236 port 51767 ssh2
2020-04-27 15:39:57
45.225.216.80 attackbots
SSH/22 MH Probe, BF, Hack -
2020-04-27 15:37:03

Recently Reported IPs

74.128.168.170 127.208.118.130 211.124.106.5 247.90.103.35
255.42.162.127 129.114.126.255 97.67.193.118 137.246.229.84
139.170.249.91 215.161.222.23 25.231.15.246 31.40.175.144
101.16.109.254 246.141.155.198 216.196.247.151 96.130.230.204
252.39.233.7 115.205.0.6 96.246.30.110 54.245.119.192