Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.192.242.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2116
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.192.242.13.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:05:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
13.242.192.125.in-addr.arpa domain name pointer flh2-125-192-242-13.tky.mesh.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.242.192.125.in-addr.arpa	name = flh2-125-192-242-13.tky.mesh.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.173.92.217 attack
Unauthorized connection attempt detected from IP address 185.173.92.217 to port 445
2020-02-13 00:50:30
128.199.220.232 attack
Feb 12 16:42:48 plex sshd[29779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.232  user=root
Feb 12 16:42:50 plex sshd[29779]: Failed password for root from 128.199.220.232 port 37994 ssh2
2020-02-13 00:47:22
106.13.208.49 attackbotsspam
Feb 12 14:41:15 legacy sshd[32734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.208.49
Feb 12 14:41:17 legacy sshd[32734]: Failed password for invalid user allstate from 106.13.208.49 port 57054 ssh2
Feb 12 14:44:38 legacy sshd[495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.208.49
...
2020-02-13 00:53:28
81.107.85.15 attackbots
Telnet Server BruteForce Attack
2020-02-13 00:54:01
69.62.147.241 attackbots
tcp 23
2020-02-13 00:29:05
115.238.116.3 attack
2020-02-12T16:52:50.041831  sshd[28401]: Invalid user aldo from 115.238.116.3 port 15116
2020-02-12T16:52:50.056744  sshd[28401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.116.3
2020-02-12T16:52:50.041831  sshd[28401]: Invalid user aldo from 115.238.116.3 port 15116
2020-02-12T16:52:52.185334  sshd[28401]: Failed password for invalid user aldo from 115.238.116.3 port 15116 ssh2
2020-02-12T16:56:56.227317  sshd[28432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.116.3  user=root
2020-02-12T16:56:58.125314  sshd[28432]: Failed password for root from 115.238.116.3 port 30783 ssh2
...
2020-02-13 00:51:20
46.42.12.19 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 00:47:07
92.151.2.22 attackspam
Feb 12 14:37:31 server sshd\[24712\]: Invalid user strahova from 92.151.2.22
Feb 12 14:37:31 server sshd\[24712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-idf1-1-2217-22.w92-151.abo.wanadoo.fr 
Feb 12 14:37:33 server sshd\[24712\]: Failed password for invalid user strahova from 92.151.2.22 port 34272 ssh2
Feb 12 16:44:18 server sshd\[16557\]: Invalid user rabbitmq from 92.151.2.22
Feb 12 16:44:18 server sshd\[16557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-idf1-1-2217-22.w92-151.abo.wanadoo.fr 
...
2020-02-13 01:08:23
223.220.159.78 attackspam
Feb 12 16:53:57 mout sshd[11587]: Invalid user cliente00 from 223.220.159.78 port 24709
2020-02-13 00:34:20
118.233.92.153 attack
Fail2Ban Ban Triggered
2020-02-13 01:14:24
91.121.16.153 attack
Feb 12 17:13:49 SilenceServices sshd[1019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.16.153
Feb 12 17:13:52 SilenceServices sshd[1019]: Failed password for invalid user jenny1 from 91.121.16.153 port 48208 ssh2
Feb 12 17:19:09 SilenceServices sshd[8306]: Failed password for root from 91.121.16.153 port 33737 ssh2
2020-02-13 01:03:28
178.62.9.117 attack
SIP/5060 Probe, BF, Hack -
2020-02-13 01:03:55
118.25.12.59 attack
Feb 12 16:55:26 MK-Soft-Root2 sshd[5386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.12.59 
Feb 12 16:55:27 MK-Soft-Root2 sshd[5386]: Failed password for invalid user fedor from 118.25.12.59 port 48634 ssh2
...
2020-02-13 00:47:41
222.186.180.142 attackbots
Feb 12 21:58:40 areeb-Workstation sshd[27576]: Failed password for root from 222.186.180.142 port 40746 ssh2
Feb 12 21:58:43 areeb-Workstation sshd[27576]: Failed password for root from 222.186.180.142 port 40746 ssh2
...
2020-02-13 00:30:42
2.136.134.161 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 01:16:58

Recently Reported IPs

177.15.238.111 103.182.4.31 206.210.222.106 216.211.141.26
180.80.244.246 121.104.85.222 42.250.214.113 174.91.79.2
31.178.128.65 213.64.99.15 9.184.224.81 51.125.145.116
99.63.60.132 63.209.99.83 131.205.241.223 101.214.211.215
60.113.220.195 107.171.100.82 143.189.144.16 202.49.195.246