Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.145.125.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.145.125.85.			IN	A

;; AUTHORITY SECTION:
.			164	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 21:12:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 85.125.145.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.125.145.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.83.70.157 attackspambots
Invalid user web from 51.83.70.157 port 48546
2019-08-01 01:18:31
165.227.67.64 attackspam
$f2bV_matches
2019-08-01 01:40:41
121.160.198.198 attackbotsspam
Jul 31 17:45:08 vps647732 sshd[2176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.160.198.198
Jul 31 17:45:10 vps647732 sshd[2176]: Failed password for invalid user mauricio from 121.160.198.198 port 54888 ssh2
...
2019-08-01 02:13:30
40.114.73.9 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-01 01:35:47
198.50.138.230 attackbotsspam
Invalid user mri from 198.50.138.230 port 60924
2019-08-01 01:51:48
192.42.116.25 attackspam
Automatic report - Banned IP Access
2019-08-01 02:08:47
138.68.27.177 attackbots
invalid user
2019-08-01 01:41:41
54.38.18.211 attack
Invalid user ubuntu from 54.38.18.211 port 50142
2019-08-01 01:17:45
103.242.56.126 attackbotsspam
SSH Brute Force, server-1 sshd[19060]: Failed password for invalid user marketing from 103.242.56.126 port 52468 ssh2
2019-08-01 02:15:57
134.175.84.31 attackspambots
Invalid user bbui from 134.175.84.31 port 34122
2019-08-01 01:57:08
180.250.205.114 attackbotsspam
Apr 27 23:27:14 ubuntu sshd[28108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.205.114
Apr 27 23:27:16 ubuntu sshd[28108]: Failed password for invalid user wasadrc from 180.250.205.114 port 49347 ssh2
Apr 27 23:30:05 ubuntu sshd[28174]: Failed password for www-data from 180.250.205.114 port 33696 ssh2
2019-08-01 01:25:35
5.189.162.208 attack
Invalid user tester from 5.189.162.208 port 37706
2019-08-01 02:06:44
51.79.28.225 attackbotsspam
Automatic report - Banned IP Access
2019-08-01 01:19:04
191.240.65.178 attackspambots
SMTP-sasl brute force
...
2019-08-01 01:39:33
118.163.193.82 attackbotsspam
Invalid user oracle from 118.163.193.82 port 60013
2019-08-01 02:14:05

Recently Reported IPs

125.2.127.225 155.188.39.118 197.3.221.10 16.197.81.79
162.158.78.75 179.207.175.110 111.160.43.5 173.156.43.42
149.109.103.148 45.29.28.4 75.163.181.10 111.81.86.123
28.48.92.251 193.19.31.116 140.249.69.162 27.240.21.158
145.89.109.52 104.151.251.254 110.104.3.204 216.162.61.220