Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.54.72.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.54.72.213.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 03:50:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
213.72.54.125.in-addr.arpa domain name pointer KD125054072213.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.72.54.125.in-addr.arpa	name = KD125054072213.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.204.182.170 attackspam
Sep 22 15:59:22 yesfletchmain sshd\[26259\]: Invalid user testuser from 129.204.182.170 port 52014
Sep 22 15:59:22 yesfletchmain sshd\[26259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.182.170
Sep 22 15:59:25 yesfletchmain sshd\[26259\]: Failed password for invalid user testuser from 129.204.182.170 port 52014 ssh2
Sep 22 16:08:21 yesfletchmain sshd\[26415\]: Invalid user internet from 129.204.182.170 port 37030
Sep 22 16:08:21 yesfletchmain sshd\[26415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.182.170
...
2019-12-24 04:24:57
218.92.0.171 attackbotsspam
Dec 23 21:16:53 vps691689 sshd[807]: Failed password for root from 218.92.0.171 port 5679 ssh2
Dec 23 21:17:03 vps691689 sshd[807]: Failed password for root from 218.92.0.171 port 5679 ssh2
Dec 23 21:17:06 vps691689 sshd[807]: Failed password for root from 218.92.0.171 port 5679 ssh2
Dec 23 21:17:06 vps691689 sshd[807]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 5679 ssh2 [preauth]
...
2019-12-24 04:26:45
187.87.17.89 attack
2323/tcp 23/tcp...
[2019-10-25/12-22]7pkt,2pt.(tcp)
2019-12-24 04:12:21
129.204.20.39 attackspam
Apr 14 18:43:08 yesfletchmain sshd\[21560\]: Invalid user Irene from 129.204.20.39 port 36519
Apr 14 18:43:08 yesfletchmain sshd\[21560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.20.39
Apr 14 18:43:10 yesfletchmain sshd\[21560\]: Failed password for invalid user Irene from 129.204.20.39 port 36519 ssh2
Apr 14 18:46:22 yesfletchmain sshd\[21617\]: Invalid user web1 from 129.204.20.39 port 53539
Apr 14 18:46:22 yesfletchmain sshd\[21617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.20.39
...
2019-12-24 04:14:16
190.66.3.92 attackbots
Dec 23 05:58:25 hpm sshd\[1863\]: Invalid user password from 190.66.3.92
Dec 23 05:58:25 hpm sshd\[1863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.66.3.92
Dec 23 05:58:27 hpm sshd\[1863\]: Failed password for invalid user password from 190.66.3.92 port 39258 ssh2
Dec 23 06:04:59 hpm sshd\[2401\]: Invalid user qwerty123456 from 190.66.3.92
Dec 23 06:04:59 hpm sshd\[2401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.66.3.92
2019-12-24 04:07:50
212.237.25.99 attack
2019-12-23T18:33:35.307150abusebot-8.cloudsearch.cf sshd[10825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.25.99  user=root
2019-12-23T18:33:37.548268abusebot-8.cloudsearch.cf sshd[10825]: Failed password for root from 212.237.25.99 port 53168 ssh2
2019-12-23T18:33:40.088595abusebot-8.cloudsearch.cf sshd[10827]: Invalid user admin from 212.237.25.99 port 58404
2019-12-23T18:33:40.096291abusebot-8.cloudsearch.cf sshd[10827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.25.99
2019-12-23T18:33:40.088595abusebot-8.cloudsearch.cf sshd[10827]: Invalid user admin from 212.237.25.99 port 58404
2019-12-23T18:33:42.025865abusebot-8.cloudsearch.cf sshd[10827]: Failed password for invalid user admin from 212.237.25.99 port 58404 ssh2
2019-12-23T18:33:44.314912abusebot-8.cloudsearch.cf sshd[10829]: Invalid user admin from 212.237.25.99 port 34792
...
2019-12-24 04:30:38
128.199.104.242 attackspambots
Dec 23 16:55:45 markkoudstaal sshd[22749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.104.242
Dec 23 16:55:48 markkoudstaal sshd[22749]: Failed password for invalid user msg from 128.199.104.242 port 42426 ssh2
Dec 23 17:01:28 markkoudstaal sshd[23319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.104.242
2019-12-24 04:44:42
177.47.193.74 attackbotsspam
445/tcp 1433/tcp...
[2019-10-28/12-22]8pkt,2pt.(tcp)
2019-12-24 04:32:49
134.209.173.240 attack
Unauthorized connection attempt detected from IP address 134.209.173.240 to port 5900
2019-12-24 04:11:12
220.85.233.145 attack
Dec 23 07:08:55 auw2 sshd\[28784\]: Invalid user vestalini from 220.85.233.145
Dec 23 07:08:55 auw2 sshd\[28784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.233.145
Dec 23 07:08:56 auw2 sshd\[28784\]: Failed password for invalid user vestalini from 220.85.233.145 port 55674 ssh2
Dec 23 07:15:34 auw2 sshd\[29528\]: Invalid user silveria from 220.85.233.145
Dec 23 07:15:34 auw2 sshd\[29528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.233.145
2019-12-24 04:11:44
49.234.86.229 attackbotsspam
Dec 23 16:59:36 vps691689 sshd[30240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.86.229
Dec 23 16:59:38 vps691689 sshd[30240]: Failed password for invalid user ### from 49.234.86.229 port 42124 ssh2
Dec 23 17:05:18 vps691689 sshd[30390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.86.229
...
2019-12-24 04:19:58
182.160.102.110 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 04:17:47
117.34.118.44 attack
12/23/2019-20:15:54.286046 117.34.118.44 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-24 04:09:10
158.69.223.91 attackspambots
2019-12-23T16:05:38.643899scmdmz1 sshd[17414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-158-69-223.net  user=root
2019-12-23T16:05:41.050865scmdmz1 sshd[17414]: Failed password for root from 158.69.223.91 port 55418 ssh2
2019-12-23T16:11:02.893029scmdmz1 sshd[17931]: Invalid user dm from 158.69.223.91 port 57780
2019-12-23T16:11:02.896356scmdmz1 sshd[17931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-158-69-223.net
2019-12-23T16:11:02.893029scmdmz1 sshd[17931]: Invalid user dm from 158.69.223.91 port 57780
2019-12-23T16:11:04.761393scmdmz1 sshd[17931]: Failed password for invalid user dm from 158.69.223.91 port 57780 ssh2
...
2019-12-24 04:31:34
129.204.142.185 attackspam
Mar 16 20:19:53 yesfletchmain sshd\[30450\]: Invalid user test from 129.204.142.185 port 35530
Mar 16 20:19:53 yesfletchmain sshd\[30450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.142.185
Mar 16 20:19:55 yesfletchmain sshd\[30450\]: Failed password for invalid user test from 129.204.142.185 port 35530 ssh2
Mar 16 20:24:58 yesfletchmain sshd\[30531\]: User root from 129.204.142.185 not allowed because not listed in AllowUsers
Mar 16 20:24:58 yesfletchmain sshd\[30531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.142.185  user=root
...
2019-12-24 04:32:00

Recently Reported IPs

126.77.124.102 224.75.190.53 81.9.4.38 224.198.251.107
230.217.4.105 108.51.102.119 217.255.72.185 12.114.198.117
57.161.62.136 109.214.205.54 61.113.47.189 165.143.200.209
164.253.148.147 236.3.186.170 249.241.246.41 118.54.120.0
137.146.143.246 237.92.18.99 29.4.225.27 59.155.20.83