Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toa Baja

Region: unknown

Country: Puerto Rico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.145.3.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;136.145.3.125.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072201 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 23 07:09:03 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 125.3.145.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.3.145.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.125.60 attack
Automatic report - Banned IP Access
2019-08-30 04:31:09
119.28.29.248 attackbots
445/tcp 445/tcp 445/tcp...
[2019-06-30/08-29]12pkt,1pt.(tcp)
2019-08-30 04:16:54
165.227.140.123 attack
Aug 29 21:46:31 vserver sshd\[5671\]: Failed password for root from 165.227.140.123 port 37094 ssh2Aug 29 21:51:07 vserver sshd\[5691\]: Failed password for root from 165.227.140.123 port 52400 ssh2Aug 29 21:56:11 vserver sshd\[5713\]: Invalid user srvadmin from 165.227.140.123Aug 29 21:56:13 vserver sshd\[5713\]: Failed password for invalid user srvadmin from 165.227.140.123 port 39464 ssh2
...
2019-08-30 04:24:08
114.67.66.199 attackspambots
Aug 29 16:29:45 mail sshd\[28673\]: Invalid user israel from 114.67.66.199
Aug 29 16:29:45 mail sshd\[28673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.66.199
...
2019-08-30 04:43:49
207.154.239.128 attackbotsspam
Aug 29 23:22:22 pkdns2 sshd\[21109\]: Invalid user anonymous from 207.154.239.128Aug 29 23:22:24 pkdns2 sshd\[21109\]: Failed password for invalid user anonymous from 207.154.239.128 port 45904 ssh2Aug 29 23:26:07 pkdns2 sshd\[21309\]: Invalid user ricarda from 207.154.239.128Aug 29 23:26:09 pkdns2 sshd\[21309\]: Failed password for invalid user ricarda from 207.154.239.128 port 34146 ssh2Aug 29 23:29:56 pkdns2 sshd\[21450\]: Invalid user fieu from 207.154.239.128Aug 29 23:29:59 pkdns2 sshd\[21450\]: Failed password for invalid user fieu from 207.154.239.128 port 50542 ssh2
...
2019-08-30 04:33:10
79.137.86.205 attackspam
Tried sshing with brute force.
2019-08-30 04:53:59
42.99.180.135 attack
Automatic report - Banned IP Access
2019-08-30 04:16:10
51.158.117.17 attackspambots
Aug 29 22:29:47 localhost sshd\[14236\]: Invalid user dw from 51.158.117.17 port 52754
Aug 29 22:29:47 localhost sshd\[14236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.117.17
Aug 29 22:29:49 localhost sshd\[14236\]: Failed password for invalid user dw from 51.158.117.17 port 52754 ssh2
2019-08-30 04:38:33
184.105.247.224 attack
Scanning random ports - tries to find possible vulnerable services
2019-08-30 04:20:26
5.62.41.160 attackspam
\[2019-08-29 22:29:23\] NOTICE\[28964\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '5.62.41.160:13653' \(callid: 1639810515-1912758407-67910016\) - Failed to authenticate
\[2019-08-29 22:29:23\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-29T22:29:23.341+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="1639810515-1912758407-67910016",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/5.62.41.160/13653",Challenge="1567110563/811ea30bf70cda7d516dc26a671b66d5",Response="4ece16973e94f8d793a053492638713c",ExpectedResponse=""
\[2019-08-29 22:29:23\] NOTICE\[24264\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '5.62.41.160:13653' \(callid: 1639810515-1912758407-67910016\) - Failed to authenticate
\[2019-08-29 22:29:23\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFail
2019-08-30 04:52:29
212.92.112.91 attackspambots
Multiple failed RDP login attempts
2019-08-30 04:26:38
177.161.120.32 attackspam
Aug 29 09:19:38 MK-Soft-VM7 sshd\[15254\]: Invalid user pi from 177.161.120.32 port 54084
Aug 29 09:19:38 MK-Soft-VM7 sshd\[15253\]: Invalid user pi from 177.161.120.32 port 54082
Aug 29 09:19:38 MK-Soft-VM7 sshd\[15254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.161.120.32
...
2019-08-30 04:29:17
80.30.139.227 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-29 19:46:24,730 INFO [amun_request_handler] PortScan Detected on Port: 445 (80.30.139.227)
2019-08-30 04:36:16
157.230.253.128 attack
2019-08-29T16:58:48.144474abusebot.cloudsearch.cf sshd\[3761\]: Invalid user ubuntu from 157.230.253.128 port 50934
2019-08-30 04:11:51
167.71.203.147 attackbotsspam
Aug 29 10:17:26 web9 sshd\[18186\]: Invalid user asf from 167.71.203.147
Aug 29 10:17:26 web9 sshd\[18186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.203.147
Aug 29 10:17:28 web9 sshd\[18186\]: Failed password for invalid user asf from 167.71.203.147 port 34046 ssh2
Aug 29 10:24:21 web9 sshd\[19570\]: Invalid user info from 167.71.203.147
Aug 29 10:24:21 web9 sshd\[19570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.203.147
2019-08-30 04:28:50

Recently Reported IPs

218.49.241.28 122.154.103.70 81.157.16.187 208.223.255.139
110.52.186.175 187.69.136.252 60.91.32.63 106.118.182.165
82.215.161.33 202.69.56.148 73.203.69.1 144.223.119.56
160.178.208.50 119.46.16.45 203.47.134.193 35.187.26.70
160.167.225.244 62.31.14.199 14.161.99.144 99.94.54.61