Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: DiGi

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.125.214.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60700
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.125.214.103.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112400 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 24 16:31:27 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 103.214.125.49.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 49.125.214.103.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.13.88.74 attack
Jun 23 14:44:45 vpn01 sshd\[26921\]: Invalid user tomcat from 106.13.88.74
Jun 23 14:44:45 vpn01 sshd\[26921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.88.74
Jun 23 14:44:47 vpn01 sshd\[26921\]: Failed password for invalid user tomcat from 106.13.88.74 port 36222 ssh2
2019-06-24 03:04:39
157.55.39.24 attack
Jun 23 12:19:54   TCP Attack: SRC=157.55.39.24 DST=[Masked] LEN=296 TOS=0x00 PREC=0x00 TTL=103  DF PROTO=TCP SPT=1268 DPT=80 WINDOW=64240 RES=0x00 ACK PSH URGP=0
2019-06-24 03:23:12
203.136.181.254 attack
2019-06-23T11:24:09.889738ldap.arvenenaske.de sshd[13217]: Connection from 203.136.181.254 port 36217 on 5.199.128.55 port 22
2019-06-23T11:24:11.408702ldap.arvenenaske.de sshd[13217]: Invalid user admin from 203.136.181.254 port 36217
2019-06-23T11:24:11.416496ldap.arvenenaske.de sshd[13217]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.136.181.254 user=admin
2019-06-23T11:24:11.417644ldap.arvenenaske.de sshd[13217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.136.181.254
2019-06-23T11:24:09.889738ldap.arvenenaske.de sshd[13217]: Connection from 203.136.181.254 port 36217 on 5.199.128.55 port 22
2019-06-23T11:24:11.408702ldap.arvenenaske.de sshd[13217]: Invalid user admin from 203.136.181.254 port 36217
2019-06-23T11:24:13.226777ldap.arvenenaske.de sshd[13217]: Failed password for invalid user admin from 203.136.181.254 port 36217 ssh2
2019-06-23T11:24:13.760659ldap.arvenenaske........
------------------------------
2019-06-24 02:51:42
51.83.78.67 attackbots
Jun 23 17:14:40 webhost01 sshd[27358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.67
Jun 23 17:14:42 webhost01 sshd[27358]: Failed password for invalid user samba from 51.83.78.67 port 40722 ssh2
...
2019-06-24 03:10:01
54.85.167.161 attackspam
Jun 23 05:45:05 localhost kernel: [12527299.248904] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=5297 PROTO=UDP SPT=30001 DPT=111 LEN=48 
Jun 23 05:45:05 localhost kernel: [12527299.248931] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=5297 PROTO=UDP SPT=30001 DPT=111 LEN=48 
Jun 23 05:45:06 localhost kernel: [12527299.410812] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=40127 PROTO=UDP SPT=30001 DPT=111 LEN=48 
Jun 23 05:45:06 localhost kernel: [12527299.410819] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=40127 PROTO=UDP SPT=30001 DPT=111 LEN=48
2019-06-24 03:06:49
188.166.251.156 attackbots
Automatic report - Web App Attack
2019-06-24 02:39:52
138.122.192.70 attack
NAME : HN-NETW1-LACNIC CIDR : 138.122.192.0/22 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 138.122.192.70  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-24 03:15:10
5.39.165.155 attack
445/tcp
[2019-06-23]1pkt
2019-06-24 02:58:37
42.53.111.208 attackspambots
23/tcp
[2019-06-23]1pkt
2019-06-24 03:21:32
104.160.41.215 attackspam
Jun 23 16:21:23 db sshd\[24475\]: Invalid user super from 104.160.41.215
Jun 23 16:21:23 db sshd\[24475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.160.41.215.16clouds.com 
Jun 23 16:21:25 db sshd\[24475\]: Failed password for invalid user super from 104.160.41.215 port 38252 ssh2
Jun 23 16:29:32 db sshd\[24556\]: Invalid user rack from 104.160.41.215
Jun 23 16:29:32 db sshd\[24556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.160.41.215.16clouds.com 
...
2019-06-24 03:15:45
178.128.195.6 attackspambots
Jun 23 21:13:27 web02 sshd\[20769\]: Invalid user admin from 178.128.195.6 port 47006
Jun 23 21:13:27 web02 sshd\[20768\]: Invalid user admin from 178.128.195.6 port 54708
...
2019-06-24 03:14:36
206.189.231.160 attack
Unauthorised access (Jun 23) SRC=206.189.231.160 LEN=40 TTL=246 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2019-06-24 02:44:48
185.86.164.100 attack
Automatic report - Web App Attack
2019-06-24 03:01:56
46.229.168.132 attack
NAME : ADVANCEDHOSTERS-NET CIDR : 46.229.168.0/23 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 46.229.168.132  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-24 02:49:09
184.105.139.123 attack
6379/tcp 445/tcp 548/tcp...
[2019-04-23/06-23]21pkt,7pt.(tcp),1pt.(udp)
2019-06-24 03:02:15

Recently Reported IPs

172.193.180.202 255.166.137.65 249.82.90.189 10.2.2.197
222.194.43.37 154.209.43.50 220.248.234.129 12.163.100.175
216.182.17.132 164.92.120.90 211.70.240.13 211.29.93.39
21.245.41.40 208.138.218.210 196.70.182.207 194.230.155.248
194.93.100.20 91.229.85.219 190.176.105.41 190.152.82.179