Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aurangabad

Region: Maharashtra

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
125.99.133.239 attackspam
" "
2020-09-17 00:13:29
125.99.133.239 attackspam
" "
2020-09-16 16:30:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.99.133.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.99.133.145.			IN	A

;; AUTHORITY SECTION:
.			201	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020101202 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 13 11:29:30 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 145.133.99.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.133.99.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
20.52.37.203 attackbots
2020-07-15T12:52:28.7526421240 sshd\[24085\]: Invalid user admin from 20.52.37.203 port 17639
2020-07-15T12:52:28.7566671240 sshd\[24085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.52.37.203
2020-07-15T12:52:30.5818931240 sshd\[24085\]: Failed password for invalid user admin from 20.52.37.203 port 17639 ssh2
...
2020-07-15 19:00:49
80.211.0.239 attackspambots
Jul 15 06:12:52 NPSTNNYC01T sshd[4478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.0.239
Jul 15 06:12:54 NPSTNNYC01T sshd[4478]: Failed password for invalid user gisela from 80.211.0.239 port 53952 ssh2
Jul 15 06:16:40 NPSTNNYC01T sshd[4863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.0.239
...
2020-07-15 18:29:16
139.59.57.2 attack
07/15/2020-06:16:42.506859 139.59.57.2 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-15 18:30:32
222.186.31.166 attack
Jul 15 03:16:30 dignus sshd[19623]: Failed password for root from 222.186.31.166 port 19656 ssh2
Jul 15 03:16:32 dignus sshd[19623]: Failed password for root from 222.186.31.166 port 19656 ssh2
Jul 15 03:16:35 dignus sshd[19659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Jul 15 03:16:37 dignus sshd[19659]: Failed password for root from 222.186.31.166 port 34591 ssh2
Jul 15 03:16:39 dignus sshd[19659]: Failed password for root from 222.186.31.166 port 34591 ssh2
...
2020-07-15 18:29:47
47.9.232.186 attackspam
[Wed Jul 15 11:42:32 2020] - Syn Flood From IP: 47.9.232.186 Port: 51613
2020-07-15 18:34:36
110.165.40.168 attackbots
Jul 15 12:16:07 PorscheCustomer sshd[1165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.165.40.168
Jul 15 12:16:09 PorscheCustomer sshd[1165]: Failed password for invalid user nexus from 110.165.40.168 port 45702 ssh2
Jul 15 12:16:47 PorscheCustomer sshd[1175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.165.40.168
...
2020-07-15 18:22:20
223.205.91.150 attackbots
Honeypot attack, port: 445, PTR: mx-ll-223.205.91-150.dynamic.3bb.in.th.
2020-07-15 18:52:07
51.116.182.194 attackbots
Jul 15 12:30:13 jane sshd[28784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.116.182.194 
Jul 15 12:30:16 jane sshd[28784]: Failed password for invalid user admin from 51.116.182.194 port 41161 ssh2
...
2020-07-15 18:32:06
222.252.17.56 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt-hanoi.com.vn.
2020-07-15 18:45:48
178.142.187.237 attack
Jul 15 17:16:35 webhost01 sshd[5059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.187.237
...
2020-07-15 18:39:23
52.242.125.203 attackspam
2020-07-15T12:43:15.007233ks3355764 sshd[21533]: Invalid user admin from 52.242.125.203 port 19868
2020-07-15T12:43:16.933447ks3355764 sshd[21533]: Failed password for invalid user admin from 52.242.125.203 port 19868 ssh2
...
2020-07-15 18:58:07
180.76.163.33 attackbots
Jul 15 12:26:39 h2779839 sshd[30379]: Invalid user wildfly from 180.76.163.33 port 49338
Jul 15 12:26:39 h2779839 sshd[30379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.163.33
Jul 15 12:26:39 h2779839 sshd[30379]: Invalid user wildfly from 180.76.163.33 port 49338
Jul 15 12:26:41 h2779839 sshd[30379]: Failed password for invalid user wildfly from 180.76.163.33 port 49338 ssh2
Jul 15 12:29:16 h2779839 sshd[30395]: Invalid user admin from 180.76.163.33 port 55072
Jul 15 12:29:16 h2779839 sshd[30395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.163.33
Jul 15 12:29:16 h2779839 sshd[30395]: Invalid user admin from 180.76.163.33 port 55072
Jul 15 12:29:18 h2779839 sshd[30395]: Failed password for invalid user admin from 180.76.163.33 port 55072 ssh2
Jul 15 12:31:52 h2779839 sshd[30415]: Invalid user m1 from 180.76.163.33 port 60804
...
2020-07-15 18:46:23
58.8.0.95 attackbots
 TCP (SYN) 58.8.0.95:62179 -> port 445, len 52
2020-07-15 19:01:21
184.82.11.244 attackbotsspam
Honeypot attack, port: 445, PTR: 184-82-11-0.24.public.erhq-mser.myaisfibre.com.
2020-07-15 19:02:01
13.66.166.169 attackbots
Jul 15 07:45:06 vps46666688 sshd[28290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.166.169
Jul 15 07:45:09 vps46666688 sshd[28290]: Failed password for invalid user admin from 13.66.166.169 port 39969 ssh2
...
2020-07-15 18:45:22

Recently Reported IPs

125.44.26.98 182.126.115.56 173.245.54.184 172.69.190.55
109.108.86.241 138.197.177.254 142.93.217.46 1.2.176.96
1.2.221.33 101.109.130.152 104.41.12.146 114.35.127.21
115.62.157.89 119.42.71.228 119.56.209.70 123.130.21.165
123.14.125.60 124.131.136.188 167.71.119.84 170.83.113.57