Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cheongju-si

Region: North Chungcheong

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6_10.3 <<>> 220.125.225.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.125.225.212.		IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041001 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Sat Apr 11 06:54:26 2020
;; MSG SIZE  rcvd: 108

Host info
Host 212.225.125.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 212.225.125.220.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
201.184.241.243 attack
Email login attempts - missing mail login name (IMAP)
2020-09-06 02:13:18
138.118.100.145 attackspambots
Automatic report - Port Scan Attack
2020-09-06 02:29:28
89.245.109.197 attackbots
Sep  4 18:46:28 mellenthin postfix/smtpd[30890]: NOQUEUE: reject: RCPT from i59F56DC5.versanet.de[89.245.109.197]: 554 5.7.1 Service unavailable; Client host [89.245.109.197] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/89.245.109.197; from= to= proto=ESMTP helo=
2020-09-06 02:38:02
78.46.61.245 attack
20 attempts against mh-misbehave-ban on leaf
2020-09-06 02:33:08
59.90.200.187 attackbotsspam
Sep  4 23:07:45 myvps sshd[23610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.90.200.187 
Sep  4 23:07:46 myvps sshd[23610]: Failed password for invalid user raspberry from 59.90.200.187 port 40572 ssh2
Sep  4 23:54:54 myvps sshd[21281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.90.200.187 
...
2020-09-06 02:34:37
189.126.169.138 attackspam
Brute force attempt
2020-09-06 02:35:41
167.114.251.164 attackspam
Invalid user ts2 from 167.114.251.164 port 58854
2020-09-06 02:32:31
110.81.102.116 attackbots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 116.102.81.110.broad.qz.fj.dynamic.163data.com.cn.
2020-09-06 02:18:23
191.37.130.132 attackspambots
Automatic report - Port Scan Attack
2020-09-06 02:27:07
195.210.172.43 attackspam
Dovecot Invalid User Login Attempt.
2020-09-06 02:12:00
37.49.230.169 attackspambots
SIPVicious Scanner Detection
2020-09-06 02:49:15
68.183.89.147 attackbotsspam
$f2bV_matches
2020-09-06 02:14:12
194.55.136.66 attack
 TCP (SYN) 194.55.136.66:64428 -> port 1433, len 52
2020-09-06 02:10:09
1.168.231.158 attack
Unauthorized connection attempt from IP address 1.168.231.158 on Port 445(SMB)
2020-09-06 02:40:06
221.179.103.2 attackbots
Automatic report BANNED IP
2020-09-06 02:20:00

Recently Reported IPs

36.81.112.113 27.213.96.17 75.206.47.30 5.196.229.117
60.253.14.84 126.152.2.228 14.155.35.0 182.56.113.158
175.116.161.158 47.194.238.54 68.34.170.82 188.104.151.41
51.91.79.72 105.129.37.93 115.226.211.121 99.8.155.208
179.53.207.156 116.6.133.108 52.186.99.41 125.130.37.129