Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Košíře

Region: Prague - the Capital (Praha - hlavni mesto)

Country: Czechia

Internet Service Provider: T-Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.144.125.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.144.125.106.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:30:56 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 106.125.144.195.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 195.144.125.106.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
43.239.152.249 attackspam
Unauthorized connection attempt detected from IP address 43.239.152.249 to port 8080 [J]
2020-01-07 08:06:52
36.65.10.22 attackbots
Unauthorized connection attempt detected from IP address 36.65.10.22 to port 8080 [J]
2020-01-07 08:07:43
186.138.110.60 attackspam
Unauthorized connection attempt detected from IP address 186.138.110.60 to port 81 [J]
2020-01-07 08:13:40
114.118.27.12 attackspam
Unauthorized connection attempt detected from IP address 114.118.27.12 to port 1433 [T]
2020-01-07 07:56:35
41.38.255.115 attack
Unauthorized connection attempt detected from IP address 41.38.255.115 to port 23
2020-01-07 08:07:28
76.99.154.138 attackspambots
Unauthorized connection attempt detected from IP address 76.99.154.138 to port 9000 [J]
2020-01-07 08:00:38
143.137.4.107 attackspam
Unauthorized connection attempt detected from IP address 143.137.4.107 to port 8080 [J]
2020-01-07 08:18:38
70.24.163.40 attack
Unauthorized connection attempt detected from IP address 70.24.163.40 to port 4567 [J]
2020-01-07 08:01:27
165.90.108.33 attack
Unauthorized connection attempt detected from IP address 165.90.108.33 to port 9000 [J]
2020-01-07 08:16:45
210.186.100.193 attack
Unauthorized connection attempt detected from IP address 210.186.100.193 to port 8000 [J]
2020-01-07 08:09:45
122.51.223.134 attack
SASL PLAIN auth failed: ruser=...
2020-01-07 08:20:29
201.202.253.24 attackbots
Unauthorized connection attempt detected from IP address 201.202.253.24 to port 81 [J]
2020-01-07 08:10:21
94.249.16.253 attackspam
Unauthorized connection attempt detected from IP address 94.249.16.253 to port 23 [J]
2020-01-07 07:59:06
185.99.215.61 attackbotsspam
Unauthorized connection attempt detected from IP address 185.99.215.61 to port 82 [J]
2020-01-07 07:47:51
106.53.90.75 attack
Nov  9 01:03:17 mail1 sshd\[890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.90.75  user=root
Nov  9 01:03:20 mail1 sshd\[890\]: Failed password for root from 106.53.90.75 port 50082 ssh2
Nov  9 01:32:18 mail1 sshd\[14555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.90.75  user=root
Nov  9 01:32:21 mail1 sshd\[14555\]: Failed password for root from 106.53.90.75 port 50388 ssh2
Nov  9 01:36:19 mail1 sshd\[16340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.90.75  user=root
...
2020-01-07 07:57:07

Recently Reported IPs

171.131.26.181 117.128.227.52 63.241.157.130 116.211.120.8
113.8.83.86 59.228.105.252 148.82.81.104 117.45.19.125
230.33.154.82 21.135.218.38 155.62.66.233 130.228.113.42
34.65.248.205 15.237.148.128 237.67.72.23 60.220.132.1
169.5.0.236 14.28.41.176 32.28.128.237 58.61.56.131