Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.42.200.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.42.200.157.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 13:11:02 CST 2022
;; MSG SIZE  rcvd: 107
Host info
157.200.42.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.200.42.125.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.62.45.17 attackbots
Jul 21 20:29:08 mail postfix/smtpd\[15012\]: NOQUEUE: reject: RCPT from unknown\[202.62.45.17\]: 554 5.7.1 Service unavailable\; Client host \[202.62.45.17\] blocked using zen.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/202.62.45.17\; from=\ to=\ proto=ESMTP helo=\\
2019-07-22 02:43:46
103.220.158.9 attack
Sun, 21 Jul 2019 07:34:58 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:18:12
193.194.69.105 attackspambots
Autoban   193.194.69.105 AUTH/CONNECT
2019-07-22 02:51:03
49.149.97.117 attack
Sun, 21 Jul 2019 07:34:54 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:26:58
193.37.70.208 attackbots
Autoban   193.37.70.208 AUTH/CONNECT
2019-07-22 02:40:47
193.248.215.77 attackspam
Autoban   193.248.215.77 AUTH/CONNECT
2019-07-22 02:47:40
192.241.167.200 attackbotsspam
Jul 21 14:03:24 XXX sshd[31614]: Invalid user test from 192.241.167.200 port 35881
2019-07-22 02:28:33
193.201.216.187 attackbotsspam
Autoban   193.201.216.187 AUTH/CONNECT
2019-07-22 02:49:56
42.114.133.187 attack
Sun, 21 Jul 2019 18:29:11 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:42:50
193.37.70.218 attackspam
Autoban   193.37.70.218 AUTH/CONNECT
2019-07-22 02:39:05
193.37.70.175 attack
Autoban   193.37.70.175 AUTH/CONNECT
2019-07-22 02:41:49
193.37.70.174 attack
Autoban   193.37.70.174 AUTH/CONNECT
2019-07-22 02:44:50
193.37.70.43 attackbots
Autoban   193.37.70.43 AUTH/CONNECT
2019-07-22 02:31:58
193.228.161.2 attackspambots
Autoban   193.228.161.2 AUTH/CONNECT
2019-07-22 02:47:57
41.37.228.54 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 09:15:43,893 INFO [shellcode_manager] (41.37.228.54) no match, writing hexdump (ee647c986349e11912ef2b68686322e6 :17416) - SMB (Unknown)
2019-07-22 02:46:57

Recently Reported IPs

125.41.206.14 125.42.214.16 125.43.179.245 125.43.199.241
125.42.229.225 125.43.21.11 125.43.212.198 125.43.26.245
125.43.26.195 125.43.203.73 125.43.72.83 125.43.89.163
125.43.39.49 125.43.34.93 125.44.152.112 125.44.12.64
125.44.21.112 125.44.22.104 125.43.27.96 125.44.191.151