Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.28.162.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15380
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.28.162.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 00:54:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
145.162.28.125.in-addr.arpa domain name pointer KD125028162145.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.162.28.125.in-addr.arpa	name = KD125028162145.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.45.248.60 attack
2587
2022-11-05 05:42:59
185.12.94.15 spam
Various Zbot Strains
2022-11-03 13:55:04
188.74.169.108 attack
اقدام ب هک
2022-10-12 03:37:21
185.63.153.200 proxy
Sexs
2022-10-14 07:24:14
159.65.117.135 attack
Brute-Force to sshd
2022-10-12 10:21:59
2001:0002:14:5:1:2:bf35:2610 spambotsattackproxynormal
Hack my phone
2022-10-22 21:26:59
162.244.118.80 spambotsattackproxynormal
Everyday it tries and its PATHETIC at this point I reported it to the FBI on IC3 website since other attempts are pinging from Russia too.
2022-10-23 15:05:41
2001:0002:14:5:1:2:bf35:2610 spambotsattacknormal
Hack my personal information
2022-10-26 08:44:47
162.62.120.175 attack
Brute-forse
2022-11-08 22:48:46
92.45.248.60 spam
2587
2022-11-05 05:44:11
92.45.248.60 normal
2045
2022-11-05 05:40:00
198.211.99.76 spambotsattackproxynormal
ssh root@198.211.99.76
2022-11-01 18:10:26
87.249.132.22 attack
Keeps trying to log in to my QNAP NAS using various usernames.
2022-10-11 03:26:10
90.151.171.109 attack
trying to connect to closed ports
2022-10-24 12:52:36
161.35.209.164 attack
Oct 15 14:48:54 host sshd[15732]: Failed password for root from 161.35.209.164 port 32816 ssh2
Oct 15 14:48:54 host sshd[15737]: Failed password for root from 161.35.209.164 port 33220 ssh2
Oct 15 14:48:54 host sshd[15734]: Failed password for root from 161.35.209.164 port 32996 ssh2
2022-10-15 17:04:53

Recently Reported IPs

127.0.211.186 22.155.103.231 213.108.3.128 13.193.40.157
236.217.217.34 101.227.49.144 188.163.153.134 203.69.203.62
226.77.135.195 211.85.88.160 207.235.127.190 41.35.102.5
163.112.139.169 232.91.141.122 188.12.14.212 246.25.0.8
59.115.56.106 31.238.216.219 150.213.219.38 71.148.146.132