Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: University of Southern California

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.125.209.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33205
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.125.209.145.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 16:53:45 CST 2019
;; MSG SIZE  rcvd: 119

Host info
145.209.125.128.in-addr.arpa domain name pointer vpn-209-145.usc.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
145.209.125.128.in-addr.arpa	name = vpn-209-145.usc.edu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
130.211.246.128 attackspam
IP attempted unauthorised action
2019-07-10 04:32:39
176.59.97.150 attackbots
Unauthorized connection attempt from IP address 176.59.97.150 on Port 445(SMB)
2019-07-10 04:19:04
104.238.116.94 attack
Automatic report - Web App Attack
2019-07-10 04:33:44
113.53.231.130 attack
Unauthorized connection attempt from IP address 113.53.231.130 on Port 445(SMB)
2019-07-10 03:58:56
175.143.5.126 attackbots
Jul  9 21:22:46 apollo sshd\[24849\]: Invalid user testuser from 175.143.5.126Jul  9 21:22:48 apollo sshd\[24849\]: Failed password for invalid user testuser from 175.143.5.126 port 52368 ssh2Jul  9 21:26:04 apollo sshd\[24878\]: Invalid user temp1 from 175.143.5.126
...
2019-07-10 04:18:11
116.252.2.96 attack
probing for wordpress favicon backdoor
GET /favicon.ico
GET /home/favicon.ico
2019-07-10 04:27:33
162.247.74.27 attackbotsspam
2019-07-09T21:47:32.022614scmdmz1 sshd\[27638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.27  user=root
2019-07-09T21:47:33.978797scmdmz1 sshd\[27638\]: Failed password for root from 162.247.74.27 port 44670 ssh2
2019-07-09T21:47:36.845922scmdmz1 sshd\[27638\]: Failed password for root from 162.247.74.27 port 44670 ssh2
...
2019-07-10 04:04:50
27.254.137.144 attackspam
SSH Brute Force, server-1 sshd[28205]: Failed password for invalid user ts from 27.254.137.144 port 48198 ssh2
2019-07-10 04:08:07
45.227.254.26 attackspambots
09.07.2019 19:58:57 Connection to port 3456 blocked by firewall
2019-07-10 04:06:15
198.55.121.27 attack
port scan/probe/communication attempt
2019-07-10 03:55:47
89.248.171.173 attackspam
Jul  9 15:55:29 web1 postfix/smtpd[25236]: warning: unknown[89.248.171.173]: SASL LOGIN authentication failed: authentication failure
Jul  9 15:55:29 web1 postfix/smtpd[25234]: warning: unknown[89.248.171.173]: SASL LOGIN authentication failed: authentication failure
...
2019-07-10 04:34:45
206.189.134.83 attackspam
Jul  9 06:09:26 *** sshd[3375]: Failed password for invalid user tabatha from 206.189.134.83 port 41598 ssh2
Jul  9 08:16:29 *** sshd[4979]: Failed password for invalid user webadmin from 206.189.134.83 port 49490 ssh2
2019-07-10 04:24:53
27.0.180.40 attackspam
Unauthorized connection attempt from IP address 27.0.180.40 on Port 445(SMB)
2019-07-10 03:49:21
150.242.140.92 attackspambots
150.242.140.92
2019-07-10 04:20:59
106.13.6.61 attackspam
wget call in url
2019-07-10 03:59:18

Recently Reported IPs

197.55.167.190 187.57.211.95 204.117.181.76 181.54.218.109
66.22.173.174 148.245.199.188 149.184.247.54 153.241.140.156
177.155.127.71 77.147.37.7 8.148.223.207 202.80.234.125
135.247.66.48 182.232.190.55 137.215.56.220 39.154.116.205
165.115.102.215 176.225.59.155 31.14.8.103 118.70.177.153