Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.99.90.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.99.90.114.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:24:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 114.90.99.125.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.90.99.125.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.142.94.222 attack
Jan 16 04:47:28 Tower sshd[6804]: refused connect from 5.253.25.37 (5.253.25.37)
Jan 16 16:19:40 Tower sshd[6804]: Connection from 14.142.94.222 port 57284 on 192.168.10.220 port 22 rdomain ""
Jan 16 16:19:42 Tower sshd[6804]: Invalid user amit from 14.142.94.222 port 57284
Jan 16 16:19:42 Tower sshd[6804]: error: Could not get shadow information for NOUSER
Jan 16 16:19:42 Tower sshd[6804]: Failed password for invalid user amit from 14.142.94.222 port 57284 ssh2
Jan 16 16:19:42 Tower sshd[6804]: Received disconnect from 14.142.94.222 port 57284:11: Bye Bye [preauth]
Jan 16 16:19:42 Tower sshd[6804]: Disconnected from invalid user amit 14.142.94.222 port 57284 [preauth]
2020-01-17 06:14:06
120.77.33.228 attack
120.77.33.228 - - \[16/Jan/2020:22:20:09 +0100\] "POST /wp-login.php HTTP/1.0" 200 6640 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
120.77.33.228 - - \[16/Jan/2020:22:20:16 +0100\] "POST /wp-login.php HTTP/1.0" 200 6453 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
120.77.33.228 - - \[16/Jan/2020:22:20:20 +0100\] "POST /wp-login.php HTTP/1.0" 200 6453 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-17 05:54:06
175.19.204.3 attackspambots
firewall-block, port(s): 1433/tcp
2020-01-17 05:52:57
103.127.41.16 attack
Jan 16 22:20:07 wordpress wordpress(www.ruhnke.cloud)[87041]: Blocked authentication attempt for admin from ::ffff:103.127.41.16
2020-01-17 06:04:20
118.114.239.158 attackspam
Port 1433 Scan
2020-01-17 05:45:03
118.174.45.29 attack
2020-01-16T21:59:15.559616shield sshd\[6873\]: Invalid user uki from 118.174.45.29 port 40124
2020-01-16T21:59:15.568683shield sshd\[6873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29
2020-01-16T21:59:17.709336shield sshd\[6873\]: Failed password for invalid user uki from 118.174.45.29 port 40124 ssh2
2020-01-16T22:02:10.652009shield sshd\[7806\]: Invalid user git from 118.174.45.29 port 35878
2020-01-16T22:02:10.659029shield sshd\[7806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29
2020-01-17 06:07:17
222.186.169.194 attackspam
2020-01-14 07:41:53 -> 2020-01-16 22:13:42 : 117 login attempts (222.186.169.194)
2020-01-17 06:15:52
175.24.130.45 attackspam
Jan 16 22:18:22 jane sshd[12622]: Failed password for root from 175.24.130.45 port 37104 ssh2
...
2020-01-17 05:59:25
114.199.67.235 attackspam
firewall-block, port(s): 222/tcp
2020-01-17 05:57:46
68.183.204.24 attackspambots
Jan 16 18:15:06 vps46666688 sshd[4305]: Failed password for root from 68.183.204.24 port 53874 ssh2
Jan 16 18:21:58 vps46666688 sshd[4408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.24
...
2020-01-17 05:41:03
222.83.110.68 attackspambots
Jan 16 22:42:40 mout sshd[5941]: Invalid user ftpuser from 222.83.110.68 port 44868
Jan 16 22:42:43 mout sshd[5941]: Failed password for invalid user ftpuser from 222.83.110.68 port 44868 ssh2
Jan 16 22:47:29 mout sshd[6359]: Invalid user adrian from 222.83.110.68 port 51452
2020-01-17 05:53:26
176.31.253.204 attack
$f2bV_matches
2020-01-17 05:56:01
35.201.180.175 attackbotsspam
F2B blocked SSH bruteforcing
2020-01-17 05:54:26
197.50.31.77 attackspambots
Unauthorized connection attempt detected from IP address 197.50.31.77 to port 445
2020-01-17 06:10:55
222.186.30.209 attackspambots
Unauthorized connection attempt detected from IP address 222.186.30.209 to port 22 [J]
2020-01-17 05:42:17

Recently Reported IPs

125.92.140.110 126.126.243.109 126.85.226.44 127.172.144.198
125.99.223.77 128.0.37.22 128.106.70.158 128.1.131.160
128.1.131.95 128.116.35.77 128.116.144.119 128.119.8.163
128.14.224.141 128.127.69.239 128.151.77.207 128.143.231.84
128.177.144.0 128.127.52.55 128.196.236.195 128.187.37.148