Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.57.21.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.57.21.144.			IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:05:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 144.21.57.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.21.57.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.100.106.135 attack
Aug 17 08:43:00 mail sshd\[2702\]: Failed password for invalid user hart from 23.100.106.135 port 57860 ssh2
Aug 17 09:00:55 mail sshd\[3176\]: Invalid user tss3 from 23.100.106.135 port 44808
Aug 17 09:00:55 mail sshd\[3176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.100.106.135
...
2019-08-17 16:03:34
36.156.24.43 attack
Aug 17 09:45:21 legacy sshd[11326]: Failed password for root from 36.156.24.43 port 34028 ssh2
Aug 17 09:45:29 legacy sshd[11330]: Failed password for root from 36.156.24.43 port 57282 ssh2
...
2019-08-17 15:53:00
37.189.160.249 attackspam
2019-08-17T03:34:03.933089abusebot.cloudsearch.cf sshd\[4818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.189.160.249  user=postfix
2019-08-17 12:05:23
142.44.160.214 attackbotsspam
Aug 17 09:19:03 SilenceServices sshd[9820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Aug 17 09:19:05 SilenceServices sshd[9820]: Failed password for invalid user jester from 142.44.160.214 port 53216 ssh2
Aug 17 09:23:58 SilenceServices sshd[13956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
2019-08-17 15:27:07
58.27.217.75 attack
Aug 17 09:18:43 vps691689 sshd[12871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.217.75
Aug 17 09:18:45 vps691689 sshd[12871]: Failed password for invalid user solr from 58.27.217.75 port 44380 ssh2
...
2019-08-17 15:28:38
167.114.210.86 attack
Aug 17 02:18:04 v22019058497090703 sshd[21697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.210.86
Aug 17 02:18:06 v22019058497090703 sshd[21697]: Failed password for invalid user secure from 167.114.210.86 port 44906 ssh2
Aug 17 02:22:25 v22019058497090703 sshd[22034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.210.86
...
2019-08-17 12:18:52
51.15.17.214 attackspam
$f2bV_matches
2019-08-17 12:20:19
159.65.4.86 attackspambots
Aug 17 09:23:37 localhost sshd\[21713\]: Invalid user abc from 159.65.4.86 port 33024
Aug 17 09:23:37 localhost sshd\[21713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.4.86
Aug 17 09:23:39 localhost sshd\[21713\]: Failed password for invalid user abc from 159.65.4.86 port 33024 ssh2
2019-08-17 15:48:34
182.61.61.44 attackspambots
Aug 17 09:17:40 h2177944 sshd\[17589\]: Invalid user srcuser from 182.61.61.44 port 49472
Aug 17 09:17:40 h2177944 sshd\[17589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.61.44
Aug 17 09:17:42 h2177944 sshd\[17589\]: Failed password for invalid user srcuser from 182.61.61.44 port 49472 ssh2
Aug 17 09:23:37 h2177944 sshd\[17758\]: Invalid user serverpilot from 182.61.61.44 port 60816
...
2019-08-17 15:52:10
91.214.114.7 attack
Aug 17 09:23:53 ubuntu-2gb-nbg1-dc3-1 sshd[7222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7
Aug 17 09:23:55 ubuntu-2gb-nbg1-dc3-1 sshd[7222]: Failed password for invalid user eko from 91.214.114.7 port 47206 ssh2
...
2019-08-17 15:29:17
138.197.213.233 attackspam
Aug 17 06:57:22 yabzik sshd[25142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.233
Aug 17 06:57:25 yabzik sshd[25142]: Failed password for invalid user saned from 138.197.213.233 port 42358 ssh2
Aug 17 07:01:43 yabzik sshd[26525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.233
2019-08-17 12:10:42
129.204.67.235 attackspam
Aug 16 21:17:38 tdfoods sshd\[4605\]: Invalid user frederick from 129.204.67.235
Aug 16 21:17:38 tdfoods sshd\[4605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.67.235
Aug 16 21:17:40 tdfoods sshd\[4605\]: Failed password for invalid user frederick from 129.204.67.235 port 54856 ssh2
Aug 16 21:23:59 tdfoods sshd\[5190\]: Invalid user guide from 129.204.67.235
Aug 16 21:23:59 tdfoods sshd\[5190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.67.235
2019-08-17 15:25:28
61.239.33.228 attackbotsspam
Aug 17 09:56:53 lnxmysql61 sshd[5831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.239.33.228
Aug 17 09:56:53 lnxmysql61 sshd[5831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.239.33.228
2019-08-17 16:01:23
141.98.9.130 attack
Aug 17 09:46:09 relay postfix/smtpd\[28346\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 17 09:46:23 relay postfix/smtpd\[21763\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 17 09:46:46 relay postfix/smtpd\[8955\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 17 09:46:59 relay postfix/smtpd\[21763\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 17 09:47:22 relay postfix/smtpd\[8955\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-17 15:50:14
119.29.104.238 attack
Aug 17 09:19:37 web sshd\[31396\]: Invalid user abdi from 119.29.104.238
Aug 17 09:19:37 web sshd\[31396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.104.238 
Aug 17 09:19:39 web sshd\[31396\]: Failed password for invalid user abdi from 119.29.104.238 port 58658 ssh2
Aug 17 09:23:28 web sshd\[31432\]: Invalid user manoel from 119.29.104.238
Aug 17 09:23:28 web sshd\[31432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.104.238 
...
2019-08-17 15:39:54

Recently Reported IPs

125.57.21.139 125.57.21.143 125.57.21.145 125.57.21.142
125.58.117.113 125.58.152.153 125.58.252.98 118.137.76.146
125.59.109.103 125.59.109.31 125.59.11.209 125.59.12.17
125.59.12.215 125.59.124.60 125.59.146.77 125.59.132.19
125.59.151.158 125.59.153.98 125.59.155.25 125.59.156.179