Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dortmund

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.229.236.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.229.236.125.		IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 17:11:32 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 125.236.229.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.236.229.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.229.225.5 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-03-17 02:56:25
104.227.245.91 attackspambots
[portscan] Port scan
2020-03-17 02:31:21
94.130.16.50 attackbotsspam
20 attempts against mh-misbehave-ban on lake
2020-03-17 02:49:50
177.139.153.186 attack
Mar 16 17:48:59 legacy sshd[31063]: Failed password for root from 177.139.153.186 port 46172 ssh2
Mar 16 17:55:40 legacy sshd[31123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.153.186
Mar 16 17:55:42 legacy sshd[31123]: Failed password for invalid user mikel from 177.139.153.186 port 58486 ssh2
...
2020-03-17 02:26:26
221.229.219.188 attackbotsspam
Fail2Ban Ban Triggered
2020-03-17 02:44:09
37.144.184.255 attackbots
1584369644 - 03/16/2020 15:40:44 Host: 37.144.184.255/37.144.184.255 Port: 445 TCP Blocked
2020-03-17 03:01:28
89.238.154.169 attackspam
Wоmen fоr seх in yоur city | USA: https://onlineuniversalwork.com/sexdating751608
2020-03-17 02:21:41
177.55.157.156 attackbots
scan r
2020-03-17 02:50:41
49.233.186.41 attackspam
Unauthorized SSH login attempts
2020-03-17 02:40:54
31.199.193.162 attack
Invalid user libuuid from 31.199.193.162 port 61022
2020-03-17 02:57:12
49.235.169.101 attackspam
ssh intrusion attempt
2020-03-17 02:40:29
140.143.164.33 attackspam
Mar 16 15:15:43 localhost sshd[129006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.164.33  user=root
Mar 16 15:15:45 localhost sshd[129006]: Failed password for root from 140.143.164.33 port 38040 ssh2
Mar 16 15:18:42 localhost sshd[129299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.164.33  user=root
Mar 16 15:18:45 localhost sshd[129299]: Failed password for root from 140.143.164.33 port 42636 ssh2
Mar 16 15:23:26 localhost sshd[129704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.164.33  user=root
Mar 16 15:23:28 localhost sshd[129704]: Failed password for root from 140.143.164.33 port 47232 ssh2
...
2020-03-17 03:02:01
111.93.235.74 attackspam
20 attempts against mh-ssh on cloud
2020-03-17 03:02:23
106.12.137.1 attackspambots
[MK-VM2] Blocked by UFW
2020-03-17 02:47:24
194.146.50.49 attackspam
Mar 16 15:41:58  exim[19310]: [1\50] 1jDqwG-00051S-SV H=fair.isefardi.com (fair.callbite.com) [194.146.50.49] F= rejected after DATA: This message scored 102.7 spam points.
2020-03-17 02:23:22

Recently Reported IPs

116.100.20.149 66.145.54.127 88.237.155.18 205.175.175.74
112.166.246.96 221.60.243.53 188.166.196.88 191.237.218.93
202.33.4.134 161.49.160.115 111.162.149.220 221.67.78.123
175.25.145.165 24.154.150.179 17.54.217.10 106.47.31.253
134.141.219.129 137.225.169.60 214.156.187.24 14.245.73.219