Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.164.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31263
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.125.164.25.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 12 17:19:30 +08 2019
;; MSG SIZE  rcvd: 117

Host info
25.164.125.45.in-addr.arpa domain name pointer newark.puzzleafter.bid.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
25.164.125.45.in-addr.arpa	name = newark.puzzleafter.bid.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
123.207.145.216 attack
Sep 13 22:05:36 web1 sshd\[27751\]: Invalid user test from 123.207.145.216
Sep 13 22:05:36 web1 sshd\[27751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.145.216
Sep 13 22:05:38 web1 sshd\[27751\]: Failed password for invalid user test from 123.207.145.216 port 41032 ssh2
Sep 13 22:10:17 web1 sshd\[28079\]: Invalid user serverpilot from 123.207.145.216
Sep 13 22:10:17 web1 sshd\[28079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.145.216
2019-09-14 04:50:54
159.65.54.48 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-09-14 05:04:03
213.139.144.10 attack
Sep 13 15:14:13 ns41 sshd[5892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
2019-09-14 05:23:55
87.238.237.109 attackspambots
13.09.2019 13:09:09 - Wordpress fail 
Detected by ELinOX-ALM
2019-09-14 05:06:22
113.88.250.163 attackbots
Sep 13 13:09:19 legacy sshd[9088]: Failed password for root from 113.88.250.163 port 19704 ssh2
Sep 13 13:09:23 legacy sshd[9091]: Failed password for root from 113.88.250.163 port 19922 ssh2
...
2019-09-14 04:57:11
41.223.142.211 attackbotsspam
Sep 13 15:35:54 vps647732 sshd[31052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211
Sep 13 15:35:56 vps647732 sshd[31052]: Failed password for invalid user teste@123 from 41.223.142.211 port 33654 ssh2
...
2019-09-14 05:16:45
216.250.125.110 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-13 10:50:00,174 INFO [amun_request_handler] PortScan Detected on Port: 445 (216.250.125.110)
2019-09-14 05:18:18
150.95.24.185 attackspambots
Invalid user admin from 150.95.24.185 port 38170
2019-09-14 05:19:34
189.175.242.90 attack
MX - 1H : (23)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : MX 
 NAME ASN : ASN8151 
 
 IP : 189.175.242.90 
 
 CIDR : 189.175.240.0/21 
 
 PREFIX COUNT : 6397 
 
 UNIQUE IP COUNT : 13800704 
 
 
 WYKRYTE ATAKI Z ASN8151 :  
  1H - 1 
  3H - 2 
  6H - 4 
 12H - 7 
 24H - 11 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-14 05:12:56
43.249.194.245 attackbotsspam
$f2bV_matches
2019-09-14 04:58:48
81.177.49.160 attackbots
Port Scan: TCP/443
2019-09-14 05:21:03
104.248.221.194 attackspambots
Sep 13 01:57:45 sachi sshd\[17990\]: Invalid user developer from 104.248.221.194
Sep 13 01:57:45 sachi sshd\[17990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.221.194
Sep 13 01:57:48 sachi sshd\[17990\]: Failed password for invalid user developer from 104.248.221.194 port 49568 ssh2
Sep 13 02:02:23 sachi sshd\[18356\]: Invalid user 123qwe from 104.248.221.194
Sep 13 02:02:23 sachi sshd\[18356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.221.194
2019-09-14 05:20:20
178.89.122.209 attackbots
KZ - 1H : (5)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KZ 
 NAME ASN : ASN9198 
 
 IP : 178.89.122.209 
 
 CIDR : 178.89.120.0/22 
 
 PREFIX COUNT : 1223 
 
 UNIQUE IP COUNT : 1472256 
 
 
 WYKRYTE ATAKI Z ASN9198 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 3 
 24H - 4 
 
 INFO : Best E-Mail Spam Filter Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-14 05:13:45
217.73.131.149 attackbots
445/tcp 445/tcp 445/tcp...
[2019-07-22/09-13]5pkt,1pt.(tcp)
2019-09-14 04:55:55
201.130.12.190 attack
Automatic report - Port Scan Attack
2019-09-14 04:46:40

Recently Reported IPs

200.146.236.217 212.64.91.146 85.146.51.123 35.192.41.81
95.158.153.109 207.46.13.66 103.21.142.12 60.13.181.244
47.75.172.46 202.182.54.6 193.34.236.43 110.232.78.43
88.200.166.18 66.154.113.71 149.255.62.56 110.189.91.9
74.11.236.60 65.155.248.130 5.141.146.159 143.208.249.223