Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.80.139.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.80.139.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 140 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 06:34:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 34.139.80.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.139.80.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.163.126.134 attackspam
2020-05-14T05:18:14.091299shield sshd\[16215\]: Invalid user postgres from 202.163.126.134 port 49614
2020-05-14T05:18:14.100945shield sshd\[16215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134
2020-05-14T05:18:16.188120shield sshd\[16215\]: Failed password for invalid user postgres from 202.163.126.134 port 49614 ssh2
2020-05-14T05:22:35.041470shield sshd\[17114\]: Invalid user sumit from 202.163.126.134 port 53350
2020-05-14T05:22:35.056396shield sshd\[17114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134
2020-05-14 15:09:30
24.3.39.126 attackbots
May 14 08:09:59 mout sshd[20082]: Invalid user tom from 24.3.39.126 port 32127
2020-05-14 15:02:47
106.5.27.120 attackbotsspam
Spam sent to honeypot address
2020-05-14 14:54:57
180.180.216.87 attackspam
20/5/13@23:51:00: FAIL: Alarm-Network address from=180.180.216.87
...
2020-05-14 15:15:46
205.185.123.139 attackspambots
Port scan(s) (1) denied
2020-05-14 14:54:07
89.36.220.145 attackspambots
May 14 07:49:57 * sshd[19731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.220.145
May 14 07:49:59 * sshd[19731]: Failed password for invalid user grace from 89.36.220.145 port 59017 ssh2
2020-05-14 14:53:36
119.29.26.222 attackbotsspam
Invalid user emms from 119.29.26.222 port 53922
2020-05-14 14:56:31
154.85.35.253 attackbotsspam
Invalid user guest from 154.85.35.253 port 59010
2020-05-14 15:06:59
82.62.153.15 attackbots
Invalid user ubuntu from 82.62.153.15 port 51211
2020-05-14 15:46:29
132.232.30.87 attack
Invalid user pgadmin from 132.232.30.87 port 43464
2020-05-14 15:10:19
46.101.151.52 attackbots
k+ssh-bruteforce
2020-05-14 15:01:16
197.253.19.74 attackspambots
Invalid user oracle from 197.253.19.74 port 1863
2020-05-14 15:29:56
186.64.122.183 attack
Bruteforce detected by fail2ban
2020-05-14 15:16:47
177.66.216.236 attack
DATE:2020-05-14 05:50:44, IP:177.66.216.236, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-14 15:28:41
218.108.119.132 attack
prod6
...
2020-05-14 15:03:09

Recently Reported IPs

189.68.102.110 138.12.216.149 249.123.233.138 119.16.2.248
7.16.42.90 237.62.68.46 188.39.68.177 44.124.208.122
34.47.185.193 55.82.51.20 208.69.117.69 123.227.50.214
106.234.149.156 4.90.23.94 80.157.131.214 220.252.198.44
212.241.62.147 202.8.99.45 73.64.152.130 94.159.13.62