Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.125.114.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36819
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.125.114.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:18:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 66.114.125.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.114.125.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.30.17.75 attackbots
Unauthorized connection attempt from IP address 95.30.17.75 on Port 445(SMB)
2020-08-05 02:34:23
200.58.117.252 attack
Automatic report - XMLRPC Attack
2020-08-05 02:36:27
138.68.176.38 attack
Failed password for root from 138.68.176.38 port 46036 ssh2
2020-08-05 02:56:36
52.188.174.102 attack
Aug  4 20:47:10 ip40 sshd[31722]: Failed password for root from 52.188.174.102 port 53794 ssh2
...
2020-08-05 03:00:11
69.245.71.26 attackbotsspam
Aug  4 21:05:47 vps639187 sshd\[28358\]: Invalid user admin@!QAZ@WSX from 69.245.71.26 port 49292
Aug  4 21:05:47 vps639187 sshd\[28358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.245.71.26
Aug  4 21:05:49 vps639187 sshd\[28358\]: Failed password for invalid user admin@!QAZ@WSX from 69.245.71.26 port 49292 ssh2
...
2020-08-05 03:06:08
116.177.20.50 attack
2020-08-04T11:25:10.098042hostname sshd[93948]: Failed password for root from 116.177.20.50 port 45430 ssh2
...
2020-08-05 02:49:10
114.67.83.42 attackspam
Aug  4 19:51:07 prod4 sshd\[9474\]: Failed password for root from 114.67.83.42 port 47402 ssh2
Aug  4 19:55:58 prod4 sshd\[11719\]: Failed password for root from 114.67.83.42 port 51926 ssh2
Aug  4 20:00:21 prod4 sshd\[14137\]: Failed password for root from 114.67.83.42 port 56436 ssh2
...
2020-08-05 03:09:06
34.93.41.18 attack
Aug  4 14:56:18 vps46666688 sshd[28680]: Failed password for root from 34.93.41.18 port 42108 ssh2
...
2020-08-05 02:36:39
61.216.73.139 attackspambots
Automatic report - XMLRPC Attack
2020-08-05 02:50:53
84.78.22.160 attackspam
Aug  4 16:11:24 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 16:33:14 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 8 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 16:33:14 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 17:05:25 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 8 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 17:05:25 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.
...
2020-08-05 03:10:58
222.208.119.107 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 222.208.119.107:43716->gjan.info:1433, len 44
2020-08-05 03:13:20
185.175.93.104 attackspam
35331/tcp 3884/tcp 44464/tcp...
[2020-06-04/08-04]1915pkt,654pt.(tcp)
2020-08-05 02:43:32
47.247.50.10 attack
Unauthorized connection attempt from IP address 47.247.50.10 on Port 445(SMB)
2020-08-05 02:35:57
182.61.12.58 attack
Bruteforce detected by fail2ban
2020-08-05 03:07:21
221.207.32.250 attackbots
firewall-block, port(s): 22/tcp
2020-08-05 02:48:06

Recently Reported IPs

47.236.137.15 50.7.210.74 145.147.102.55 155.81.225.241
203.8.47.77 202.122.193.107 174.77.195.158 65.135.227.165
225.211.124.84 65.222.57.144 178.13.186.83 33.184.14.5
70.81.89.123 98.38.146.153 158.112.34.212 25.201.191.42
99.220.51.208 182.100.17.68 156.149.52.143 30.126.111.171