Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.121.25.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.121.25.72.			IN	A

;; AUTHORITY SECTION:
.			497	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:22:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 72.25.121.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.25.121.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.211.250.181 attack
5050/udp 6060/udp 65476/udp...
[2019-05-15/07-15]33pkt,4pt.(udp)
2019-07-16 05:04:07
221.214.152.34 attackspam
5500/tcp 5500/tcp 5500/tcp...
[2019-06-22/07-14]13pkt,1pt.(tcp)
2019-07-16 04:50:47
45.118.217.16 attack
Automatic report - Port Scan Attack
2019-07-16 05:03:31
129.205.161.44 attackspam
vps1:sshd-InvalidUser
2019-07-16 05:29:01
114.33.233.226 attack
Jul 15 16:42:02 TORMINT sshd\[26342\]: Invalid user wesley from 114.33.233.226
Jul 15 16:42:02 TORMINT sshd\[26342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.233.226
Jul 15 16:42:03 TORMINT sshd\[26342\]: Failed password for invalid user wesley from 114.33.233.226 port 19570 ssh2
...
2019-07-16 04:55:59
192.34.60.79 attackbots
Jul 15 22:26:47 mail sshd\[13404\]: Invalid user akhan123 from 192.34.60.79 port 56924
Jul 15 22:26:47 mail sshd\[13404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.60.79
...
2019-07-16 05:33:16
125.71.213.74 attack
Jul 15 16:02:39 vtv3 sshd\[22543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.71.213.74  user=root
Jul 15 16:02:42 vtv3 sshd\[22543\]: Failed password for root from 125.71.213.74 port 52162 ssh2
Jul 15 16:11:43 vtv3 sshd\[27256\]: Invalid user admin from 125.71.213.74 port 50560
Jul 15 16:11:43 vtv3 sshd\[27256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.71.213.74
Jul 15 16:11:45 vtv3 sshd\[27256\]: Failed password for invalid user admin from 125.71.213.74 port 50560 ssh2
Jul 15 16:23:46 vtv3 sshd\[771\]: Invalid user one from 125.71.213.74 port 50482
Jul 15 16:23:46 vtv3 sshd\[771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.71.213.74
Jul 15 16:23:48 vtv3 sshd\[771\]: Failed password for invalid user one from 125.71.213.74 port 50482 ssh2
Jul 15 16:29:59 vtv3 sshd\[3667\]: Invalid user aris from 125.71.213.74 port 50518
Jul 15 16:29:59 vtv3 sshd\[3667
2019-07-16 05:11:28
92.52.27.210 attack
Repeated attempts against wp-login
2019-07-16 04:57:22
103.225.20.38 attack
missing rdns
2019-07-16 05:28:17
201.17.24.195 attack
2019-07-15T20:56:41.920017abusebot-6.cloudsearch.cf sshd\[31573\]: Invalid user aleks from 201.17.24.195 port 54086
2019-07-16 05:12:16
81.22.45.254 attackbots
15.07.2019 20:40:09 Connection to port 2012 blocked by firewall
2019-07-16 04:58:58
116.140.168.246 attackspam
5500/tcp 5500/tcp 5500/tcp...
[2019-07-13/15]4pkt,1pt.(tcp)
2019-07-16 04:55:38
219.233.49.39 attackspambots
2019-07-15T20:22:48.663693+01:00 suse sshd[31352]: User root from 219.233.49.39 not allowed because not listed in AllowUsers
2019-07-15T20:22:51.541886+01:00 suse sshd[31352]: error: PAM: Authentication failure for illegal user root from 219.233.49.39
2019-07-15T20:22:48.663693+01:00 suse sshd[31352]: User root from 219.233.49.39 not allowed because not listed in AllowUsers
2019-07-15T20:22:51.541886+01:00 suse sshd[31352]: error: PAM: Authentication failure for illegal user root from 219.233.49.39
2019-07-15T20:22:48.663693+01:00 suse sshd[31352]: User root from 219.233.49.39 not allowed because not listed in AllowUsers
2019-07-15T20:22:51.541886+01:00 suse sshd[31352]: error: PAM: Authentication failure for illegal user root from 219.233.49.39
2019-07-15T20:22:51.566427+01:00 suse sshd[31352]: Failed keyboard-interactive/pam for invalid user root from 219.233.49.39 port 55956 ssh2
...
2019-07-16 05:10:44
5.77.54.68 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-18/07-15]27pkt,1pt.(tcp)
2019-07-16 05:23:22
185.176.221.41 attack
3333/tcp 1111/tcp 9999/tcp...
[2019-06-05/07-15]73pkt,11pt.(tcp)
2019-07-16 05:15:19

Recently Reported IPs

138.121.25.16 138.121.25.67 138.121.25.69 138.121.25.198
138.121.25.86 118.174.69.52 138.121.27.102 138.121.27.181
138.121.27.49 118.174.69.56 138.121.28.129 138.121.28.132
138.121.28.122 138.121.28.105 138.121.28.137 138.121.28.144
138.121.28.177 138.121.28.155 138.121.29.116 138.121.29.123