Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.46.125.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.46.125.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 20:28:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
114.125.46.138.in-addr.arpa domain name pointer generalcable.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.125.46.138.in-addr.arpa	name = generalcable.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.121.126.107 attackspam
Unauthorized connection attempt detected from IP address 190.121.126.107 to port 23 [J]
2020-01-13 03:52:59
196.218.9.125 attackspam
Unauthorized connection attempt detected from IP address 196.218.9.125 to port 23 [J]
2020-01-13 03:51:43
45.55.80.186 attack
Jan 12 20:07:14 sso sshd[13420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.80.186
Jan 12 20:07:16 sso sshd[13420]: Failed password for invalid user gerry from 45.55.80.186 port 42136 ssh2
...
2020-01-13 03:46:54
180.96.14.25 attack
Unauthorized connection attempt detected from IP address 180.96.14.25 to port 1433 [J]
2020-01-13 03:54:48
219.70.207.84 attack
Unauthorized connection attempt detected from IP address 219.70.207.84 to port 5555 [J]
2020-01-13 04:13:39
36.85.220.123 attackbotsspam
Unauthorized connection attempt detected from IP address 36.85.220.123 to port 80 [J]
2020-01-13 03:47:36
73.46.175.100 attack
Unauthorized connection attempt detected from IP address 73.46.175.100 to port 4567 [J]
2020-01-13 03:44:50
45.169.112.133 attackspambots
Unauthorized connection attempt detected from IP address 45.169.112.133 to port 8081 [J]
2020-01-13 04:10:40
92.115.3.219 attack
Unauthorized connection attempt detected from IP address 92.115.3.219 to port 23 [J]
2020-01-13 03:42:56
78.140.32.16 attack
Unauthorized connection attempt detected from IP address 78.140.32.16 to port 8080 [J]
2020-01-13 04:07:46
221.141.197.202 attackbotsspam
Unauthorized connection attempt detected from IP address 221.141.197.202 to port 8081 [J]
2020-01-13 03:48:49
103.253.0.77 attackbots
Unauthorized connection attempt detected from IP address 103.253.0.77 to port 8080 [J]
2020-01-13 03:40:19
177.11.136.78 attack
Unauthorized connection attempt detected from IP address 177.11.136.78 to port 8080 [J]
2020-01-13 03:55:35
108.209.171.50 attackbotsspam
Unauthorized connection attempt detected from IP address 108.209.171.50 to port 82 [J]
2020-01-13 03:39:32
183.192.244.124 attack
Unauthorized connection attempt detected from IP address 183.192.244.124 to port 23 [J]
2020-01-13 03:53:46

Recently Reported IPs

170.40.252.160 193.64.214.80 2.133.84.164 59.152.186.195
9.6.115.249 76.95.205.51 253.156.38.90 5.139.155.159
135.206.248.194 66.68.127.93 2.28.75.215 225.113.82.155
232.73.66.166 101.13.246.13 206.136.115.25 240.138.75.36
70.116.250.141 72.215.47.83 61.184.135.239 161.55.41.26