Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.227.167.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.227.167.125.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:42:54 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 125.167.227.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.167.227.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.101.58.67 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 04:30:51
112.85.42.180 attack
Feb 10 21:40:02 MK-Soft-VM3 sshd[19887]: Failed password for root from 112.85.42.180 port 23355 ssh2
Feb 10 21:40:07 MK-Soft-VM3 sshd[19887]: Failed password for root from 112.85.42.180 port 23355 ssh2
...
2020-02-11 04:45:51
117.217.94.19 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-11 04:29:56
106.12.93.25 attack
Feb 10 18:07:32 silence02 sshd[2640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25
Feb 10 18:07:35 silence02 sshd[2640]: Failed password for invalid user ha from 106.12.93.25 port 34246 ssh2
Feb 10 18:11:05 silence02 sshd[2870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25
2020-02-11 04:50:37
103.226.142.90 attack
Automatic report - Banned IP Access
2020-02-11 05:08:12
202.107.238.94 attackbotsspam
$f2bV_matches
2020-02-11 05:06:55
113.240.237.10 attackspam
Brute force attempt
2020-02-11 04:55:39
138.0.60.5 attackbots
$f2bV_matches
2020-02-11 05:02:57
202.107.232.162 attackbotsspam
$f2bV_matches
2020-02-11 05:08:30
112.85.193.169 attackspam
Feb 10 14:36:49 grey postfix/smtpd\[12424\]: NOQUEUE: reject: RCPT from unknown\[112.85.193.169\]: 554 5.7.1 Service unavailable\; Client host \[112.85.193.169\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[112.85.193.169\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-11 04:53:10
202.112.114.204 attack
$f2bV_matches
2020-02-11 04:49:01
5.133.62.101 attackspambots
(imapd) Failed IMAP login from 5.133.62.101 (IT/Italy/-): 1 in the last 3600 secs
2020-02-11 04:40:39
198.108.66.88 attackbotsspam
11211/tcp 8088/tcp 20000/tcp...
[2019-12-16/2020-02-10]11pkt,11pt.(tcp)
2020-02-11 05:04:48
74.82.47.20 attackspam
trying to access non-authorized port
2020-02-11 04:51:31
94.102.56.181 attackbots
" "
2020-02-11 04:37:30

Recently Reported IPs

71.35.122.5 130.150.92.242 55.219.119.95 26.10.242.90
164.60.61.42 185.232.233.43 65.201.189.47 215.181.165.43
171.126.145.255 48.186.63.51 118.41.198.189 89.73.26.39
166.170.127.202 81.124.5.159 183.54.106.19 229.74.172.176
122.93.242.69 53.147.57.100 175.7.211.227 67.145.88.165