Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.48.97.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.48.97.125.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023042502 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 26 11:22:17 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 125.97.48.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 125.97.48.142.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
201.219.208.42 attackbotsspam
email spam
2020-03-01 18:36:39
177.73.250.160 attackbots
spam
2020-03-01 18:42:00
218.4.164.86 attackbotsspam
Mar  1 09:48:56 silence02 sshd[25663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.164.86
Mar  1 09:48:58 silence02 sshd[25663]: Failed password for invalid user watari from 218.4.164.86 port 62431 ssh2
Mar  1 09:53:56 silence02 sshd[25937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.164.86
2020-03-01 18:51:28
64.207.93.210 attack
spam
2020-03-01 18:49:47
88.118.131.30 attackspam
spam
2020-03-01 18:27:07
213.80.166.5 attackspambots
spam
2020-03-01 18:21:25
212.107.232.45 attackspambots
spam
2020-03-01 18:21:51
194.28.223.242 attackspambots
Brute force attempt
2020-03-01 18:37:13
212.126.108.172 attack
Brute force attempt
2020-03-01 18:35:39
46.172.69.163 attackbotsspam
spam
2020-03-01 18:50:18
41.193.50.102 attackbots
TCP src-port=59778   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (127)
2020-03-01 18:29:28
190.104.233.95 attack
spam
2020-03-01 18:38:25
84.245.103.83 attackbotsspam
email spam
2020-03-01 18:48:40
213.33.157.204 attackspam
spam
2020-03-01 18:52:46
109.202.17.4 attackspam
spam
2020-03-01 18:26:39

Recently Reported IPs

59.19.137.99 111.150.90.224 66.71.251.68 76.17.73.7
21.148.240.219 59.4.241.133 224.183.244.198 251.91.48.140
191.25.211.37 97.65.61.97 147.254.113.26 196.128.91.142
229.103.251.150 82.207.8.120 128.104.44.241 114.219.253.89
122.17.164.156 25.192.130.154 65.251.120.94 198.89.204.153