Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.125.14.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.125.14.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:34:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 91.14.125.131.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 91.14.125.131.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
116.102.42.204 attackspam
Unauthorized connection attempt detected from IP address 116.102.42.204 to port 5555 [J]
2020-02-01 01:30:54
111.231.144.41 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-02-01 02:02:51
220.124.186.246 attackbotsspam
Port Scan
2020-02-01 01:17:37
85.174.207.197 attackspam
Unauthorized connection attempt from IP address 85.174.207.197 on Port 445(SMB)
2020-02-01 01:51:19
222.186.190.92 attackspambots
Jan 31 18:47:14 SilenceServices sshd[27592]: Failed password for root from 222.186.190.92 port 33546 ssh2
Jan 31 18:47:18 SilenceServices sshd[27592]: Failed password for root from 222.186.190.92 port 33546 ssh2
Jan 31 18:47:27 SilenceServices sshd[27592]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 33546 ssh2 [preauth]
2020-02-01 01:58:00
52.56.32.218 attack
W 31101,/var/log/nginx/access.log,-,-
2020-02-01 01:44:22
111.254.31.72 attack
1580491934 - 01/31/2020 18:32:14 Host: 111.254.31.72/111.254.31.72 Port: 445 TCP Blocked
2020-02-01 01:39:42
185.206.215.245 attackbots
Unauthorized connection attempt detected from IP address 185.206.215.245 to port 2220 [J]
2020-02-01 01:47:45
150.109.167.155 attack
Unauthorized connection attempt detected from IP address 150.109.167.155 to port 7402 [J]
2020-02-01 01:29:13
119.146.145.104 attackspambots
(sshd) Failed SSH login from 119.146.145.104 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 31 17:06:15 andromeda sshd[16007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104  user=admin
Jan 31 17:06:18 andromeda sshd[16007]: Failed password for admin from 119.146.145.104 port 2249 ssh2
Jan 31 17:31:58 andromeda sshd[17141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104  user=admin
2020-02-01 01:54:16
92.119.160.143 attackspam
01/31/2020-12:32:15.866062 92.119.160.143 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-01 01:40:08
159.192.171.239 attackspam
Unauthorized connection attempt detected from IP address 159.192.171.239 to port 23 [J]
2020-02-01 01:28:43
210.44.14.38 attackspambots
Unauthorized connection attempt detected from IP address 210.44.14.38 to port 1433 [J]
2020-02-01 01:19:48
165.169.133.184 attackbotsspam
Automatic report - Port Scan Attack
2020-02-01 01:49:08
87.226.213.255 attackbotsspam
Unauthorized connection attempt from IP address 87.226.213.255 on Port 445(SMB)
2020-02-01 01:38:16

Recently Reported IPs

7.193.92.221 4.98.2.39 249.172.175.48 151.203.215.48
218.14.177.146 42.216.104.18 142.129.109.171 20.52.112.113
223.234.57.252 55.10.9.190 76.151.105.101 232.0.241.164
26.184.215.101 185.2.42.171 25.29.115.39 215.205.11.54
130.5.92.48 54.213.98.178 218.119.110.3 253.38.166.119