Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.125.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22395
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.125.72.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:27:53 CST 2022
;; MSG SIZE  rcvd: 107
Host info
72.125.239.145.in-addr.arpa domain name pointer ip72.ip-145-239-125.eu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.125.239.145.in-addr.arpa	name = ip72.ip-145-239-125.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.67.236.120 attack
Dec  3 13:45:31 kapalua sshd\[20613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.236.120  user=root
Dec  3 13:45:33 kapalua sshd\[20613\]: Failed password for root from 114.67.236.120 port 57976 ssh2
Dec  3 13:51:04 kapalua sshd\[21166\]: Invalid user chika from 114.67.236.120
Dec  3 13:51:04 kapalua sshd\[21166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.236.120
Dec  3 13:51:07 kapalua sshd\[21166\]: Failed password for invalid user chika from 114.67.236.120 port 34318 ssh2
2019-12-04 08:13:56
220.167.166.25 attackbotsspam
Unauthorized connection attempt from IP address 220.167.166.25 on Port 445(SMB)
2019-12-04 08:10:13
182.61.11.3 attackbots
2019-12-04T00:28:02.060487abusebot-3.cloudsearch.cf sshd\[11080\]: Invalid user raschbacher from 182.61.11.3 port 52098
2019-12-04 08:31:42
164.163.236.9 attack
Attempted to connect 9 times to port 4504 TCP
2019-12-04 08:48:28
118.25.27.67 attack
Dec  4 01:15:48 localhost sshd\[21466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67  user=news
Dec  4 01:15:50 localhost sshd\[21466\]: Failed password for news from 118.25.27.67 port 60866 ssh2
Dec  4 01:22:18 localhost sshd\[21765\]: Invalid user rpm from 118.25.27.67
Dec  4 01:22:18 localhost sshd\[21765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67
Dec  4 01:22:20 localhost sshd\[21765\]: Failed password for invalid user rpm from 118.25.27.67 port 43118 ssh2
...
2019-12-04 08:30:24
118.24.9.152 attack
[ssh] SSH attack
2019-12-04 08:45:53
190.39.239.30 attackspam
Unauthorized connection attempt from IP address 190.39.239.30 on Port 445(SMB)
2019-12-04 08:31:23
193.70.2.117 attackspam
Dec  4 00:47:38 sauna sshd[11096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.2.117
Dec  4 00:47:40 sauna sshd[11096]: Failed password for invalid user sweetpea from 193.70.2.117 port 55930 ssh2
...
2019-12-04 08:36:02
106.13.139.252 attack
Dec  3 14:24:02 web9 sshd\[15299\]: Invalid user emiliojose from 106.13.139.252
Dec  3 14:24:02 web9 sshd\[15299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252
Dec  3 14:24:04 web9 sshd\[15299\]: Failed password for invalid user emiliojose from 106.13.139.252 port 46664 ssh2
Dec  3 14:30:37 web9 sshd\[16184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252  user=root
Dec  3 14:30:39 web9 sshd\[16184\]: Failed password for root from 106.13.139.252 port 49790 ssh2
2019-12-04 08:36:55
51.254.129.128 attack
Dec  4 03:51:02 gw1 sshd[20148]: Failed password for root from 51.254.129.128 port 56544 ssh2
...
2019-12-04 08:27:03
92.222.158.249 attackspambots
$f2bV_matches
2019-12-04 08:32:59
218.92.0.148 attackbots
Dec  4 01:45:03 srv01 sshd[29390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Dec  4 01:45:04 srv01 sshd[29390]: Failed password for root from 218.92.0.148 port 28598 ssh2
Dec  4 01:45:08 srv01 sshd[29390]: Failed password for root from 218.92.0.148 port 28598 ssh2
Dec  4 01:45:03 srv01 sshd[29390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Dec  4 01:45:04 srv01 sshd[29390]: Failed password for root from 218.92.0.148 port 28598 ssh2
Dec  4 01:45:08 srv01 sshd[29390]: Failed password for root from 218.92.0.148 port 28598 ssh2
Dec  4 01:45:03 srv01 sshd[29390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Dec  4 01:45:04 srv01 sshd[29390]: Failed password for root from 218.92.0.148 port 28598 ssh2
Dec  4 01:45:08 srv01 sshd[29390]: Failed password for root from 218.92.0.148 port 28598 
...
2019-12-04 08:48:00
149.34.4.98 attackbots
Netgear DGN Device Remote Command Execution Vulnerability
2019-12-04 08:44:04
142.44.240.12 attackspambots
2019-12-04T00:06:00.800770abusebot.cloudsearch.cf sshd\[19289\]: Invalid user mysql from 142.44.240.12 port 42320
2019-12-04 08:12:17
115.150.210.122 attackbotsspam
Unauthorized connection attempt from IP address 115.150.210.122 on Port 445(SMB)
2019-12-04 08:19:15

Recently Reported IPs

145.239.125.117 145.239.125.82 145.239.126.152 145.239.126.153
145.239.13.38 145.239.131.12 145.239.131.15 145.239.136.177
145.239.138.152 145.239.14.14 145.239.140.61 145.239.181.150
145.239.192.251 145.239.193.102 145.239.206.130 145.239.206.160
145.239.219.13 145.239.216.145 145.239.22.138 145.239.223.90