Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.84.239.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.84.239.139.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:13:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.239.84.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.239.84.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.128.94 attackspam
Oct  4 07:04:33 vps691689 sshd[15655]: Failed password for root from 51.38.128.94 port 39784 ssh2
Oct  4 07:09:02 vps691689 sshd[15735]: Failed password for root from 51.38.128.94 port 53242 ssh2
...
2019-10-04 13:14:53
219.94.99.133 attack
Automatic report - Banned IP Access
2019-10-04 12:36:12
128.199.128.215 attack
Jan 16 19:57:32 vtv3 sshd\[22362\]: Invalid user ubuntu1 from 128.199.128.215 port 58382
Jan 16 19:57:32 vtv3 sshd\[22362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215
Jan 16 19:57:34 vtv3 sshd\[22362\]: Failed password for invalid user ubuntu1 from 128.199.128.215 port 58382 ssh2
Jan 16 20:02:32 vtv3 sshd\[23995\]: Invalid user helpdesk from 128.199.128.215 port 58638
Jan 16 20:02:32 vtv3 sshd\[23995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215
Feb 23 10:07:57 vtv3 sshd\[1319\]: Invalid user chris from 128.199.128.215 port 54534
Feb 23 10:07:57 vtv3 sshd\[1319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215
Feb 23 10:07:59 vtv3 sshd\[1319\]: Failed password for invalid user chris from 128.199.128.215 port 54534 ssh2
Feb 23 10:13:04 vtv3 sshd\[3002\]: Invalid user teamspeak3 from 128.199.128.215 port 60992
Feb 23 10:13:04
2019-10-04 13:13:07
46.33.225.84 attack
Oct  4 00:38:53 TORMINT sshd\[5879\]: Invalid user 123Fashion from 46.33.225.84
Oct  4 00:38:53 TORMINT sshd\[5879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.33.225.84
Oct  4 00:38:55 TORMINT sshd\[5879\]: Failed password for invalid user 123Fashion from 46.33.225.84 port 34832 ssh2
...
2019-10-04 12:51:38
208.180.33.94 attack
Sep 30 07:13:03 fv15 postfix/smtpd[15116]: connect from 208-180-33-94.com.sta.suddenlink.net[208.180.33.94]
Sep 30 07:13:05 fv15 postgrey[1056]: action=greylist, reason=new, client_name=208-180-33-94.com.sta.suddenlink.net, client_address=208.180.33.94, sender=x@x recipient=x@x
Sep 30 07:13:05 fv15 policyd-spf[363]: Softfail; identhostnamey=mailfrom; client-ip=208.180.33.94; helo=208-180-33-94.com.sta.suddenlink.net; envelope-from=x@x
Sep x@x
Sep 30 07:13:05 fv15 postfix/smtpd[15116]: lost connection after RCPT from 208-180-33-94.com.sta.suddenlink.net[208.180.33.94]
Sep 30 07:13:05 fv15 postfix/smtpd[15116]: disconnect from 208-180-33-94.com.sta.suddenlink.net[208.180.33.94]
Sep 30 09:16:45 fv15 postfix/smtpd[12782]: connect from 208-180-33-94.com.sta.suddenlink.net[208.180.33.94]
Sep 30 09:16:47 fv15 postgrey[1056]: action=greylist, reason=new, client_name=208-180-33-94.com.sta.suddenlink.net, client_address=208.180.33.94, sender=x@x recipient=x@x
Sep 30 09:16:47 fv15........
-------------------------------
2019-10-04 13:27:49
154.8.167.48 attackspambots
Oct  4 06:53:10 www sshd\[227025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.167.48  user=root
Oct  4 06:53:12 www sshd\[227025\]: Failed password for root from 154.8.167.48 port 54088 ssh2
Oct  4 06:58:05 www sshd\[227088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.167.48  user=root
...
2019-10-04 13:05:49
188.131.142.109 attackbotsspam
Oct  4 07:03:38 MK-Soft-VM4 sshd[19130]: Failed password for root from 188.131.142.109 port 53608 ssh2
...
2019-10-04 13:18:35
180.168.36.86 attack
Oct  4 07:33:58 sauna sshd[125285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86
Oct  4 07:34:01 sauna sshd[125285]: Failed password for invalid user Utilisateur@123 from 180.168.36.86 port 2556 ssh2
...
2019-10-04 12:49:08
222.186.15.160 attackspambots
Oct  4 07:25:52 server2 sshd\[28225\]: User root from 222.186.15.160 not allowed because not listed in AllowUsers
Oct  4 07:33:46 server2 sshd\[28861\]: User root from 222.186.15.160 not allowed because not listed in AllowUsers
Oct  4 07:35:17 server2 sshd\[29074\]: User root from 222.186.15.160 not allowed because not listed in AllowUsers
Oct  4 07:35:17 server2 sshd\[29076\]: User root from 222.186.15.160 not allowed because not listed in AllowUsers
Oct  4 07:35:18 server2 sshd\[29072\]: User root from 222.186.15.160 not allowed because not listed in AllowUsers
Oct  4 07:35:18 server2 sshd\[29078\]: User root from 222.186.15.160 not allowed because not listed in AllowUsers
2019-10-04 12:41:39
222.186.175.8 attack
Oct  4 06:56:20 tux-35-217 sshd\[2317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.8  user=root
Oct  4 06:56:22 tux-35-217 sshd\[2317\]: Failed password for root from 222.186.175.8 port 6126 ssh2
Oct  4 06:56:27 tux-35-217 sshd\[2317\]: Failed password for root from 222.186.175.8 port 6126 ssh2
Oct  4 06:56:31 tux-35-217 sshd\[2317\]: Failed password for root from 222.186.175.8 port 6126 ssh2
...
2019-10-04 13:03:15
185.143.221.34 attackbotsspam
They are hitting my RDP many times per minute.  They are trying to guess the password for "administrator" and "admin".
2019-10-04 13:27:00
193.32.160.143 attackbotsspam
2019-10-04 07:18:44 H=\(\[193.32.160.143\]\) \[193.32.160.143\] F=\ rejected RCPT \: Unrouteable address
2019-10-04 07:18:44 H=\(\[193.32.160.143\]\) \[193.32.160.143\] F=\ rejected RCPT \: Unrouteable address
2019-10-04 07:18:44 H=\(\[193.32.160.143\]\) \[193.32.160.143\] F=\ rejected RCPT \: Unrouteable address
2019-10-04 07:18:44 H=\(\[193.32.160.143\]\) \[193.32.160.143\] F=\ rejected RCPT \: Unrouteable address
2019-10-04 07:18:44 H=\(\[193.32.160.143\]\) \[193.32.160.143\] F=\ rejected RCPT \: Unrouteable address
2019-10-04 07:18:44 H=\(\[193.32.160.143\]\) \[193.32.160.143\] F=\ rejected RCPT \: Unrouteable address
2019-10-04 07:18:44 H=\(\[193.32.160.143\]\) \[193.32.160.143\] F=\
2019-10-04 13:23:29
111.200.168.133 attackbotsspam
Oct  4 05:58:42 host proftpd\[22132\]: 0.0.0.0 \(111.200.168.133\[111.200.168.133\]\) - USER anonymous: no such user found from 111.200.168.133 \[111.200.168.133\] to 62.210.146.38:21
...
2019-10-04 12:41:10
80.211.16.26 attack
Oct  4 00:28:17 ny01 sshd[21741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26
Oct  4 00:28:19 ny01 sshd[21741]: Failed password for invalid user Amigo2017 from 80.211.16.26 port 40766 ssh2
Oct  4 00:32:27 ny01 sshd[22439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26
2019-10-04 12:45:12
182.116.36.103 attackspambots
Unauthorised access (Oct  4) SRC=182.116.36.103 LEN=40 TTL=49 ID=25376 TCP DPT=8080 WINDOW=23195 SYN
2019-10-04 13:15:39

Recently Reported IPs

118.160.91.227 125.84.239.14 125.84.239.140 125.84.239.143
125.84.239.148 125.84.239.151 125.84.239.157 125.84.239.158
125.84.239.165 125.84.239.169 125.84.239.166 125.84.239.18
118.160.91.246 125.84.239.180 125.84.239.189 125.84.239.191
125.84.239.197 125.84.239.2 125.84.239.209 125.84.239.217