Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.199.108.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.199.108.145.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:35:55 CST 2025
;; MSG SIZE  rcvd: 108
Host info
145.108.199.125.in-addr.arpa domain name pointer FL1-125-199-108-145.nig.mesh.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.108.199.125.in-addr.arpa	name = FL1-125-199-108-145.nig.mesh.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
154.160.22.139 attackbots
GET /wp-login.php
2020-06-18 22:12:16
182.61.54.213 attackspam
Jun 18 15:46:26 vpn01 sshd[25408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.54.213
Jun 18 15:46:28 vpn01 sshd[25408]: Failed password for invalid user kwinfo from 182.61.54.213 port 58782 ssh2
...
2020-06-18 22:25:35
119.40.33.22 attack
Jun 18 16:06:59 buvik sshd[17398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.33.22
Jun 18 16:07:01 buvik sshd[17398]: Failed password for invalid user mohamed from 119.40.33.22 port 47302 ssh2
Jun 18 16:11:07 buvik sshd[18054]: Invalid user maxim from 119.40.33.22
...
2020-06-18 22:32:09
158.69.194.115 attackbots
SSH Brute-Forcing (server1)
2020-06-18 22:43:44
62.234.90.140 attackspambots
SSH brute force attempt
2020-06-18 22:56:15
94.191.23.15 attackbots
Automatic report BANNED IP
2020-06-18 22:20:39
190.145.78.212 attack
20/6/18@08:07:32: FAIL: Alarm-Network address from=190.145.78.212
20/6/18@08:07:32: FAIL: Alarm-Network address from=190.145.78.212
...
2020-06-18 22:59:42
27.223.89.238 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-18 22:42:52
189.146.161.240 attack
1592482078 - 06/18/2020 14:07:58 Host: 189.146.161.240/189.146.161.240 Port: 445 TCP Blocked
2020-06-18 22:34:36
92.222.74.255 attackspambots
SSH Bruteforce attack
2020-06-18 22:29:13
85.107.100.124 attackbots
Automatic report - XMLRPC Attack
2020-06-18 22:16:32
104.248.187.165 attackbots
 TCP (SYN) 104.248.187.165:45452 -> port 13220, len 44
2020-06-18 22:28:17
157.245.211.120 attack
$f2bV_matches
2020-06-18 22:46:10
142.44.218.192 attack
Jun 18 14:50:10 piServer sshd[12840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192 
Jun 18 14:50:13 piServer sshd[12840]: Failed password for invalid user demo from 142.44.218.192 port 35938 ssh2
Jun 18 14:53:59 piServer sshd[13095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192 
...
2020-06-18 22:12:47
68.183.82.97 attack
Jun 18 14:19:51 eventyay sshd[1304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.82.97
Jun 18 14:19:52 eventyay sshd[1304]: Failed password for invalid user manager from 68.183.82.97 port 37774 ssh2
Jun 18 14:23:47 eventyay sshd[1426]: Failed password for root from 68.183.82.97 port 39226 ssh2
...
2020-06-18 22:29:25

Recently Reported IPs

60.174.47.88 28.9.194.60 217.186.178.63 68.165.145.159
18.249.181.113 71.253.180.189 108.220.235.33 63.76.241.1
213.116.171.230 222.46.39.142 84.58.88.197 133.106.49.132
5.133.91.43 20.120.241.181 168.29.110.14 166.26.151.37
144.156.69.20 38.200.37.234 232.231.83.24 132.163.76.158