Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.30.52.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11910
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.30.52.25.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 15:56:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
25.52.30.125.in-addr.arpa domain name pointer 25.52.30.125.dy.iij4u.or.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
25.52.30.125.in-addr.arpa	name = 25.52.30.125.dy.iij4u.or.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.43.198.13 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-02 03:09:42
195.110.34.149 attack
Fail2Ban Ban Triggered
2020-04-02 03:29:28
31.135.45.22 attackspambots
1585744140 - 04/01/2020 14:29:00 Host: 31.135.45.22/31.135.45.22 Port: 445 TCP Blocked
2020-04-02 03:42:27
5.188.84.24 attackspam
"GET /wp-login.php HTTP/1.1"
2020-04-02 03:23:56
221.224.211.174 attackspam
Invalid user kids from 221.224.211.174 port 50840
2020-04-02 03:46:15
14.232.74.11 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-04-02 03:05:05
192.241.201.182 attackbotsspam
(sshd) Failed SSH login from 192.241.201.182 (US/United States/-): 5 in the last 3600 secs
2020-04-02 03:45:30
45.136.108.85 attackspambots
01.04.2020 18:40:27 SSH access blocked by firewall
2020-04-02 03:37:50
129.211.18.180 attack
Apr  1 20:04:26 ns381471 sshd[12617]: Failed password for root from 129.211.18.180 port 27068 ssh2
2020-04-02 03:26:41
51.158.117.104 attack
port scan and connect, tcp 443 (https)
2020-04-02 03:32:26
110.8.67.146 attack
Invalid user ow from 110.8.67.146 port 43990
2020-04-02 03:27:53
49.88.112.77 attack
Apr  1 10:30:18 firewall sshd[21326]: Failed password for root from 49.88.112.77 port 42687 ssh2
Apr  1 10:30:21 firewall sshd[21326]: Failed password for root from 49.88.112.77 port 42687 ssh2
Apr  1 10:30:23 firewall sshd[21326]: Failed password for root from 49.88.112.77 port 42687 ssh2
...
2020-04-02 03:14:07
80.82.77.139 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 2121 proto: TCP cat: Misc Attack
2020-04-02 03:10:52
176.120.110.186 attackbotsspam
Unauthorized connection attempt detected from IP address 176.120.110.186 to port 80
2020-04-02 03:46:03
46.229.168.132 attackbots
Automatic report - Banned IP Access
2020-04-02 03:24:14

Recently Reported IPs

55.226.236.230 87.15.24.45 108.245.125.64 28.30.80.236
53.214.171.130 217.123.129.162 74.63.170.200 49.49.68.5
29.102.83.48 91.132.94.55 50.244.201.239 203.142.106.17
255.167.90.131 141.39.122.218 155.160.188.11 231.239.66.243
182.200.158.57 202.217.220.145 127.163.217.100 186.162.167.11