Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.30.196.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.30.196.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 19:23:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
220.196.30.125.in-addr.arpa domain name pointer 220.196.30.125.bf.2iij.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.196.30.125.in-addr.arpa	name = 220.196.30.125.bf.2iij.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.204.66.45 attackbotsspam
Aug  2 08:51:01 sip sshd[3272]: Failed password for root from 129.204.66.45 port 37882 ssh2
Aug  2 09:02:41 sip sshd[7583]: Failed password for root from 129.204.66.45 port 40754 ssh2
2020-08-02 19:32:23
139.198.177.151 attack
Bruteforce detected by fail2ban
2020-08-02 19:44:32
109.165.235.243 attackbots
Attempted connection to port 1433.
2020-08-02 19:41:03
36.75.238.207 attackbots
Unauthorized connection attempt from IP address 36.75.238.207 on Port 445(SMB)
2020-08-02 19:39:48
157.32.78.36 attack
Attempted connection to port 445.
2020-08-02 19:38:29
114.35.55.23 attack
Attempted connection to port 81.
2020-08-02 19:39:18
83.233.120.250 attackbotsspam
SSH bruteforce
2020-08-02 19:29:39
87.251.74.223 attackbots
[H1.VM10] Blocked by UFW
2020-08-02 19:54:53
113.161.166.44 attackbotsspam
Unauthorized connection attempt from IP address 113.161.166.44 on Port 445(SMB)
2020-08-02 19:31:28
41.78.75.45 attackspambots
Aug  2 13:03:16 minden010 sshd[19854]: Failed password for root from 41.78.75.45 port 24549 ssh2
Aug  2 13:08:05 minden010 sshd[20348]: Failed password for root from 41.78.75.45 port 9036 ssh2
...
2020-08-02 19:53:56
103.78.81.227 attackspam
Invalid user siyamalan from 103.78.81.227 port 36382
2020-08-02 19:19:37
186.67.6.58 attackbotsspam
Unauthorized connection attempt from IP address 186.67.6.58 on Port 445(SMB)
2020-08-02 19:42:58
114.88.159.126 attackbotsspam
Unauthorized connection attempt from IP address 114.88.159.126 on Port 445(SMB)
2020-08-02 19:38:59
108.5.191.238 attackspam
Unauthorized connection attempt from IP address 108.5.191.238 on Port 445(SMB)
2020-08-02 19:50:36
192.99.247.102 attackspam
Invalid user shr from 192.99.247.102 port 55820
2020-08-02 19:42:33

Recently Reported IPs

242.237.179.59 155.224.126.222 82.104.215.148 24.137.60.246
90.215.97.175 191.119.54.93 250.104.111.238 252.110.106.218
75.18.58.181 235.178.35.157 202.201.78.231 122.67.1.103
119.96.179.167 191.72.69.184 55.204.130.45 16.221.175.225
121.252.241.207 39.173.57.0 40.2.38.251 16.243.253.26