Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.203.125.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.203.125.109.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:54:56 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 109.125.203.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.125.203.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.165.40.62 attackspambots
1580705370 - 02/03/2020 05:49:30 Host: 125.165.40.62/125.165.40.62 Port: 445 TCP Blocked
2020-02-03 17:19:30
212.64.40.155 attackspam
Unauthorized connection attempt detected from IP address 212.64.40.155 to port 2220 [J]
2020-02-03 17:03:52
182.61.184.155 attackbots
Feb  2 23:05:08 hpm sshd\[30172\]: Invalid user tommy from 182.61.184.155
Feb  2 23:05:08 hpm sshd\[30172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.184.155
Feb  2 23:05:10 hpm sshd\[30172\]: Failed password for invalid user tommy from 182.61.184.155 port 45872 ssh2
Feb  2 23:08:25 hpm sshd\[30354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.184.155  user=mysql
Feb  2 23:08:27 hpm sshd\[30354\]: Failed password for mysql from 182.61.184.155 port 47218 ssh2
2020-02-03 17:21:32
79.43.57.22 attack
port scan and connect, tcp 22 (ssh)
2020-02-03 17:15:13
117.197.30.226 attackspambots
DATE:2020-02-03 05:48:52, IP:117.197.30.226, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-02-03 17:08:44
66.70.142.220 attackspam
Unauthorized connection attempt detected from IP address 66.70.142.220 to port 2220 [J]
2020-02-03 17:28:33
2.237.19.168 attackspam
Unauthorized connection attempt detected from IP address 2.237.19.168 to port 2220 [J]
2020-02-03 17:20:38
103.108.87.187 attack
Feb  3 09:59:26 legacy sshd[24214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.108.87.187
Feb  3 09:59:28 legacy sshd[24214]: Failed password for invalid user dollar from 103.108.87.187 port 54746 ssh2
Feb  3 10:03:15 legacy sshd[24349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.108.87.187
...
2020-02-03 17:29:04
80.82.65.90 attackbotsspam
Port 4411 scan denied
2020-02-03 17:36:22
222.186.30.35 attackspambots
Feb  3 10:20:31 dcd-gentoo sshd[13061]: User root from 222.186.30.35 not allowed because none of user's groups are listed in AllowGroups
Feb  3 10:20:33 dcd-gentoo sshd[13061]: error: PAM: Authentication failure for illegal user root from 222.186.30.35
Feb  3 10:20:31 dcd-gentoo sshd[13061]: User root from 222.186.30.35 not allowed because none of user's groups are listed in AllowGroups
Feb  3 10:20:33 dcd-gentoo sshd[13061]: error: PAM: Authentication failure for illegal user root from 222.186.30.35
Feb  3 10:20:31 dcd-gentoo sshd[13061]: User root from 222.186.30.35 not allowed because none of user's groups are listed in AllowGroups
Feb  3 10:20:33 dcd-gentoo sshd[13061]: error: PAM: Authentication failure for illegal user root from 222.186.30.35
Feb  3 10:20:33 dcd-gentoo sshd[13061]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.35 port 62029 ssh2
...
2020-02-03 17:21:03
101.108.251.31 attack
1580705335 - 02/03/2020 05:48:55 Host: 101.108.251.31/101.108.251.31 Port: 445 TCP Blocked
2020-02-03 17:45:23
54.36.180.236 attackspam
Automatic report - Banned IP Access
2020-02-03 17:08:18
170.244.6.231 attack
Unauthorized connection attempt detected from IP address 170.244.6.231 to port 2220 [J]
2020-02-03 17:05:19
164.132.225.250 attackspam
Unauthorized connection attempt detected from IP address 164.132.225.250 to port 2220 [J]
2020-02-03 17:22:33
192.241.237.51 attackspambots
Port scan (80/tcp)
2020-02-03 17:07:06

Recently Reported IPs

172.235.107.83 127.123.32.6 227.35.83.158 219.195.241.145
34.26.98.205 98.207.113.62 216.80.17.192 142.143.1.156
143.176.229.7 174.59.44.212 148.155.157.46 130.129.35.199
195.150.133.172 252.179.167.23 13.179.67.102 28.18.122.43
250.104.205.254 200.207.164.148 53.141.34.180 66.169.70.173