Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.163.125.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.163.125.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025090700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 07 18:50:39 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 148.125.163.180.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.125.163.180.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.91.136.65 attackbotsspam
IP: 51.91.136.65
ASN: AS16276 OVH SAS
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 16/12/2019 6:57:24 AM UTC
2019-12-16 17:26:20
112.116.155.205 attack
Dec 16 08:32:53 ns381471 sshd[32458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.116.155.205
Dec 16 08:32:55 ns381471 sshd[32458]: Failed password for invalid user operator from 112.116.155.205 port 40722 ssh2
2019-12-16 17:54:58
66.249.65.127 attackspam
Automatic report - Banned IP Access
2019-12-16 17:18:44
27.73.115.83 attackspambots
IP: 27.73.115.83
ASN: AS7552 Viettel Group
Port: Message Submission 587
Found in one or more Blacklists
Date: 16/12/2019 6:57:17 AM UTC
2019-12-16 17:36:15
40.92.5.28 attack
Dec 16 09:27:24 debian-2gb-vpn-nbg1-1 kernel: [856014.497940] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.5.28 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=230 ID=32163 DF PROTO=TCP SPT=11076 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-16 17:23:12
115.217.18.102 attackbotsspam
FTP Brute Force
2019-12-16 17:21:58
167.99.81.101 attack
Dec 15 21:50:00 php1 sshd\[14671\]: Invalid user leilani from 167.99.81.101
Dec 15 21:50:00 php1 sshd\[14671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101
Dec 15 21:50:02 php1 sshd\[14671\]: Failed password for invalid user leilani from 167.99.81.101 port 59412 ssh2
Dec 15 21:55:36 php1 sshd\[15249\]: Invalid user ABCDEF from 167.99.81.101
Dec 15 21:55:36 php1 sshd\[15249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101
2019-12-16 17:19:06
197.47.21.221 attack
IP: 197.47.21.221
ASN: AS8452 TE-AS
Port: Message Submission 587
Found in one or more Blacklists
Date: 16/12/2019 6:57:12 AM UTC
2019-12-16 17:42:02
111.68.46.68 attack
Dec 16 09:19:25 microserver sshd[26291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.46.68  user=root
Dec 16 09:19:27 microserver sshd[26291]: Failed password for root from 111.68.46.68 port 51707 ssh2
Dec 16 09:26:18 microserver sshd[27598]: Invalid user kupferschmidt from 111.68.46.68 port 54884
Dec 16 09:26:18 microserver sshd[27598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.46.68
Dec 16 09:26:19 microserver sshd[27598]: Failed password for invalid user kupferschmidt from 111.68.46.68 port 54884 ssh2
Dec 16 09:40:02 microserver sshd[29419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.46.68  user=root
Dec 16 09:40:05 microserver sshd[29419]: Failed password for root from 111.68.46.68 port 33002 ssh2
Dec 16 09:46:50 microserver sshd[30735]: Invalid user ja from 111.68.46.68 port 36219
Dec 16 09:46:50 microserver sshd[30735]: pam_unix(sshd:auth): authentic
2019-12-16 17:34:58
190.25.232.2 attackspam
2019-12-16T09:18:16.444606host3.slimhost.com.ua sshd[143394]: Invalid user code2v3 from 190.25.232.2 port 53139
2019-12-16T09:18:16.450263host3.slimhost.com.ua sshd[143394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=chmcolombia.co
2019-12-16T09:18:16.444606host3.slimhost.com.ua sshd[143394]: Invalid user code2v3 from 190.25.232.2 port 53139
2019-12-16T09:18:18.848192host3.slimhost.com.ua sshd[143394]: Failed password for invalid user code2v3 from 190.25.232.2 port 53139 ssh2
2019-12-16T09:27:33.441176host3.slimhost.com.ua sshd[154007]: Invalid user fenderson from 190.25.232.2 port 40059
2019-12-16T09:27:33.445743host3.slimhost.com.ua sshd[154007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=chmcolombia.co
2019-12-16T09:27:33.441176host3.slimhost.com.ua sshd[154007]: Invalid user fenderson from 190.25.232.2 port 40059
2019-12-16T09:27:35.645250host3.slimhost.com.ua sshd[154007]: Failed password for
...
2019-12-16 17:50:08
129.204.19.107 attackbots
Dec 15 23:16:52 auw2 sshd\[8830\]: Invalid user hymans from 129.204.19.107
Dec 15 23:16:52 auw2 sshd\[8830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.19.107
Dec 15 23:16:54 auw2 sshd\[8830\]: Failed password for invalid user hymans from 129.204.19.107 port 56446 ssh2
Dec 15 23:26:18 auw2 sshd\[9798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.19.107  user=root
Dec 15 23:26:19 auw2 sshd\[9798\]: Failed password for root from 129.204.19.107 port 34538 ssh2
2019-12-16 17:43:30
188.246.226.71 attackspam
Port scan: Attack repeated for 24 hours
2019-12-16 17:26:38
52.63.200.251 attackbotsspam
IP: 52.63.200.251
ASN: AS16509 Amazon.com Inc.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 16/12/2019 6:57:25 AM UTC
2019-12-16 17:24:48
117.35.118.42 attack
Dec 15 23:24:18 web1 sshd\[25224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42  user=root
Dec 15 23:24:20 web1 sshd\[25224\]: Failed password for root from 117.35.118.42 port 35397 ssh2
Dec 15 23:30:27 web1 sshd\[25817\]: Invalid user luebke from 117.35.118.42
Dec 15 23:30:27 web1 sshd\[25817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42
Dec 15 23:30:28 web1 sshd\[25817\]: Failed password for invalid user luebke from 117.35.118.42 port 58178 ssh2
2019-12-16 17:44:35
191.100.26.142 attackspam
Dec 16 09:02:48 localhost sshd\[13765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.26.142  user=root
Dec 16 09:02:50 localhost sshd\[13765\]: Failed password for root from 191.100.26.142 port 50822 ssh2
Dec 16 09:10:57 localhost sshd\[14048\]: Invalid user vs from 191.100.26.142 port 46295
Dec 16 09:10:57 localhost sshd\[14048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.26.142
Dec 16 09:10:58 localhost sshd\[14048\]: Failed password for invalid user vs from 191.100.26.142 port 46295 ssh2
...
2019-12-16 17:30:36

Recently Reported IPs

42.248.7.159 38.91.118.114 106.75.128.155 106.75.139.77
62.210.205.26 128.241.235.32 122.193.226.87 10.10.10.61
14.212.94.68 167.94.138.166 165.22.246.234 200.59.88.225
51.195.8.3 123.9.119.253 20.65.195.96 59.174.80.142
103.158.174.160 113.215.188.42 162.216.150.13 159.65.17.11