Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.125.80.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.125.80.245.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 22:32:42 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 245.80.125.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.80.125.221.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.156.15.221 attackbots
23/tcp
[2020-10-03]1pkt
2020-10-05 00:04:50
190.24.59.9 attackspambots
8080/tcp
[2020-10-03]1pkt
2020-10-04 23:26:25
218.92.0.250 attack
Oct  4 17:28:32 abendstille sshd\[8790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Oct  4 17:28:34 abendstille sshd\[8814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Oct  4 17:28:35 abendstille sshd\[8790\]: Failed password for root from 218.92.0.250 port 46292 ssh2
Oct  4 17:28:35 abendstille sshd\[8814\]: Failed password for root from 218.92.0.250 port 17857 ssh2
Oct  4 17:28:38 abendstille sshd\[8790\]: Failed password for root from 218.92.0.250 port 46292 ssh2
...
2020-10-04 23:41:35
193.193.229.66 attack
445/tcp 445/tcp
[2020-10-03]2pkt
2020-10-04 23:59:20
103.79.154.234 attackbots
 TCP (SYN) 103.79.154.234:34669 -> port 23, len 44
2020-10-05 00:04:24
80.237.28.146 attackspam
SMB Server BruteForce Attack
2020-10-04 23:29:34
79.115.37.21 attack
5555/tcp
[2020-10-03]1pkt
2020-10-04 23:43:19
35.204.152.99 attack
(mod_security) mod_security (id:5000135) triggered by 35.204.152.99 (NL/Netherlands/99.152.204.35.bc.googleusercontent.com): 5 in the last 14400 secs; ID: zul
2020-10-04 23:43:59
103.57.220.28 attack
Oct  4 16:10:28 b-vps wordpress(rreb.cz)[1366]: Authentication attempt for unknown user barbora from 103.57.220.28
...
2020-10-04 23:34:47
175.143.86.250 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-10-04 23:30:55
89.242.123.84 attack
8080/tcp
[2020-10-03]1pkt
2020-10-04 23:52:12
69.162.120.69 attack
Connection Attempt(s) On Port 1433
2020-10-04 23:37:39
189.14.189.82 attackspambots
63199/udp
[2020-10-03]1pkt
2020-10-04 23:28:04
35.239.143.173 attackspam
IP already banned
2020-10-04 23:31:50
209.198.180.142 attackbotsspam
Oct  4 16:53:35 s1 sshd\[19663\]: User root from 209.198.180.142 not allowed because not listed in AllowUsers
Oct  4 16:53:35 s1 sshd\[19663\]: Failed password for invalid user root from 209.198.180.142 port 32976 ssh2
Oct  4 16:57:24 s1 sshd\[24405\]: User root from 209.198.180.142 not allowed because not listed in AllowUsers
Oct  4 16:57:24 s1 sshd\[24405\]: Failed password for invalid user root from 209.198.180.142 port 39838 ssh2
Oct  4 17:01:15 s1 sshd\[29146\]: User root from 209.198.180.142 not allowed because not listed in AllowUsers
Oct  4 17:01:15 s1 sshd\[29146\]: Failed password for invalid user root from 209.198.180.142 port 46706 ssh2
...
2020-10-04 23:53:22

Recently Reported IPs

185.94.96.66 69.88.138.44 124.222.115.252 217.225.24.197
34.142.80.77 180.119.68.46 202.168.69.229 193.114.115.186
47.92.55.129 159.69.33.80 45.136.253.90 179.211.140.18
59.29.193.61 68.183.191.94 141.149.48.153 192.81.211.153
34.125.221.146 125.137.184.104 23.183.192.214 38.65.139.34