Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ghana

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.168.45.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.168.45.125.			IN	A

;; AUTHORITY SECTION:
.			99	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 19:49:13 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 125.45.168.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.45.168.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.28.187.44 attackspambots
suspicious action Mon, 24 Feb 2020 15:10:44 -0300
2020-02-25 04:41:32
156.96.56.119 attackbots
Unauthorized connection attempt from IP address 156.96.56.119 on Port 25(SMTP)
2020-02-25 04:35:14
31.183.243.85 attackbots
Email rejected due to spam filtering
2020-02-25 04:44:05
88.147.15.131 attackspambots
suspicious action Mon, 24 Feb 2020 15:46:15 -0300
2020-02-25 04:44:52
132.145.187.218 attackspam
Automatic report - Port Scan
2020-02-25 05:02:10
42.200.116.184 attack
Unauthorized connection attempt detected from IP address 42.200.116.184 to port 445
2020-02-25 04:59:17
123.16.185.140 attackbots
Lines containing failures of 123.16.185.140
Feb 24 14:15:27 shared12 sshd[2390]: Invalid user admin from 123.16.185.140 port 55219
Feb 24 14:15:27 shared12 sshd[2390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.185.140
Feb 24 14:15:29 shared12 sshd[2390]: Failed password for invalid user admin from 123.16.185.140 port 55219 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.16.185.140
2020-02-25 04:24:01
88.249.2.97 attackspambots
Automatic report - Banned IP Access
2020-02-25 04:54:15
181.115.221.254 attackbotsspam
T: f2b postfix aggressive 3x
2020-02-25 04:31:27
84.55.15.217 attack
Unauthorized connection attempt from IP address 84.55.15.217 on Port 445(SMB)
2020-02-25 04:46:45
82.223.16.182 attackbots
Invalid user ftpuser from 82.223.16.182 port 55910
2020-02-25 04:56:43
115.155.1.121 attackspam
Feb 24 09:55:19 tdfoods sshd\[13704\]: Invalid user user from 115.155.1.121
Feb 24 09:55:19 tdfoods sshd\[13704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.155.1.121
Feb 24 09:55:21 tdfoods sshd\[13704\]: Failed password for invalid user user from 115.155.1.121 port 20886 ssh2
Feb 24 10:01:07 tdfoods sshd\[14119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.155.1.121  user=tdportal
Feb 24 10:01:10 tdfoods sshd\[14119\]: Failed password for tdportal from 115.155.1.121 port 20131 ssh2
2020-02-25 05:06:14
89.106.108.187 attack
DATE:2020-02-24 19:27:23, IP:89.106.108.187, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-25 04:41:15
113.179.111.225 attackbotsspam
Automatic report - Port Scan Attack
2020-02-25 04:59:01
108.218.242.35 attackspambots
DATE:2020-02-24 14:20:44, IP:108.218.242.35, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-25 04:56:17

Recently Reported IPs

193.79.69.111 102.92.242.193 207.244.225.103 36.112.209.142
163.83.200.66 87.103.151.49 165.109.131.235 253.33.179.144
185.15.175.107 186.79.99.66 16.125.210.90 135.73.191.6
225.248.139.26 38.186.141.33 10.170.147.169 221.188.222.154
42.71.145.85 64.159.24.18 145.236.139.127 209.59.221.23