Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 25.122.139.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9754
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;25.122.139.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 20:22:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 0.139.122.25.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.139.122.25.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.57.8.198 attack
Apr 11 06:52:00 pve sshd[28077]: Failed password for root from 58.57.8.198 port 45838 ssh2
Apr 11 06:54:43 pve sshd[32624]: Failed password for root from 58.57.8.198 port 47610 ssh2
2020-04-11 14:22:31
145.239.88.43 attackbotsspam
2020-04-11T02:14:50.147249mail.thespaminator.com sshd[23623]: Invalid user test from 145.239.88.43 port 60892
2020-04-11T02:14:52.139909mail.thespaminator.com sshd[23623]: Failed password for invalid user test from 145.239.88.43 port 60892 ssh2
...
2020-04-11 14:34:56
123.31.32.150 attack
$f2bV_matches
2020-04-11 14:32:24
27.76.52.229 attackspam
1586577188 - 04/11/2020 05:53:08 Host: 27.76.52.229/27.76.52.229 Port: 445 TCP Blocked
2020-04-11 14:56:19
111.231.81.72 attack
Apr 11 10:38:07 gw1 sshd[6982]: Failed password for root from 111.231.81.72 port 56884 ssh2
...
2020-04-11 14:36:38
111.231.33.135 attackspambots
Apr 11 14:25:39 f sshd\[10835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.33.135
Apr 11 14:25:41 f sshd\[10835\]: Failed password for invalid user jerome from 111.231.33.135 port 35532 ssh2
Apr 11 14:27:44 f sshd\[10856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.33.135
...
2020-04-11 14:55:41
61.74.118.139 attackbots
Invalid user test from 61.74.118.139 port 35712
2020-04-11 14:37:42
106.13.138.162 attack
(sshd) Failed SSH login from 106.13.138.162 (CN/China/-): 5 in the last 3600 secs
2020-04-11 14:16:54
159.89.115.74 attackbots
Invalid user ubuntu from 159.89.115.74 port 41754
2020-04-11 14:32:04
89.248.169.12 attack
SNORT TCP  Port: 110 Classtype misc-attack - ET CINS Active Threat Intelligence Poor Reputation IP group 84 - - Destination xx.xx.4.1 Port: 110 - - Source 89.248.169.12 Port: 55569   (Listed on  abuseat-org zen-spamhaus)     (56)
2020-04-11 14:44:07
68.183.232.107 attackbots
1586583847 - 04/11/2020 12:44:07 Host: 68.183.232.107/68.183.232.107 Port: 23 TCP Blocked
...
2020-04-11 14:44:27
150.109.57.43 attackspambots
Apr 11 08:27:43 odroid64 sshd\[16074\]: User root from 150.109.57.43 not allowed because not listed in AllowUsers
Apr 11 08:27:43 odroid64 sshd\[16074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.57.43  user=root
...
2020-04-11 14:35:50
192.241.201.182 attackspambots
Apr 11 07:58:11 eventyay sshd[2606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.201.182
Apr 11 07:58:13 eventyay sshd[2606]: Failed password for invalid user wwwrun from 192.241.201.182 port 41880 ssh2
Apr 11 08:03:36 eventyay sshd[2756]: Failed password for root from 192.241.201.182 port 51528 ssh2
...
2020-04-11 14:20:02
103.136.40.15 attack
$f2bV_matches
2020-04-11 14:45:41
106.12.7.100 attack
Apr 11 08:28:18 plex sshd[25461]: Invalid user helpdesk from 106.12.7.100 port 37462
2020-04-11 14:53:29

Recently Reported IPs

78.90.247.16 182.167.69.227 219.129.32.100 160.19.164.55
129.236.212.168 187.236.62.159 153.69.243.172 246.77.90.246
97.33.252.156 161.4.185.43 106.65.14.124 108.154.62.118
146.117.140.253 185.176.150.140 79.203.206.71 253.99.242.182
136.195.252.219 130.154.39.112 12.254.111.57 97.108.145.194