Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.139.177.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.139.177.125.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 18:23:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 125.177.139.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.177.139.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.169 attackspambots
Nov  7 12:26:37 microserver sshd[31050]: Failed none for root from 222.186.175.169 port 51534 ssh2
Nov  7 12:26:39 microserver sshd[31050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Nov  7 12:26:41 microserver sshd[31050]: Failed password for root from 222.186.175.169 port 51534 ssh2
Nov  7 12:26:46 microserver sshd[31050]: Failed password for root from 222.186.175.169 port 51534 ssh2
Nov  7 12:26:51 microserver sshd[31050]: Failed password for root from 222.186.175.169 port 51534 ssh2
Nov  7 17:33:00 microserver sshd[5951]: Failed none for root from 222.186.175.169 port 54920 ssh2
Nov  7 17:33:02 microserver sshd[5951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Nov  7 17:33:03 microserver sshd[5951]: Failed password for root from 222.186.175.169 port 54920 ssh2
Nov  7 17:33:08 microserver sshd[5951]: Failed password for root from 222.186.175.169 port 54920 ssh2
Nov
2019-11-10 05:17:05
61.222.56.80 attackspambots
Nov  9 20:28:18 MK-Soft-Root2 sshd[19437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80 
Nov  9 20:28:20 MK-Soft-Root2 sshd[19437]: Failed password for invalid user 1234@1234a from 61.222.56.80 port 49654 ssh2
...
2019-11-10 05:09:38
123.194.189.140 attack
Unauthorised access (Nov  9) SRC=123.194.189.140 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=28291 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-10 05:16:28
218.92.0.202 attackbots
Nov  9 21:17:25 MK-Soft-Root1 sshd[22999]: Failed password for root from 218.92.0.202 port 19370 ssh2
Nov  9 21:17:28 MK-Soft-Root1 sshd[22999]: Failed password for root from 218.92.0.202 port 19370 ssh2
...
2019-11-10 04:52:16
51.77.245.181 attackspam
Nov  9 21:41:03 vmanager6029 sshd\[5931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.181  user=root
Nov  9 21:41:06 vmanager6029 sshd\[5931\]: Failed password for root from 51.77.245.181 port 42174 ssh2
Nov  9 21:44:17 vmanager6029 sshd\[6056\]: Invalid user michel from 51.77.245.181 port 51630
Nov  9 21:44:17 vmanager6029 sshd\[6056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.181
2019-11-10 05:09:59
104.238.110.156 attack
SSH bruteforce
2019-11-10 04:39:43
62.76.14.3 attackbots
Unauthorized connection attempt from IP address 62.76.14.3 on Port 445(SMB)
2019-11-10 04:57:59
138.186.17.134 attackspam
Unauthorized connection attempt from IP address 138.186.17.134 on Port 445(SMB)
2019-11-10 04:58:29
200.149.231.50 attackspam
2019-11-09T16:48:10.296483shield sshd\[10737\]: Invalid user secapro from 200.149.231.50 port 51076
2019-11-09T16:48:10.300706shield sshd\[10737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.149.231.50
2019-11-09T16:48:12.094841shield sshd\[10737\]: Failed password for invalid user secapro from 200.149.231.50 port 51076 ssh2
2019-11-09T16:52:56.095569shield sshd\[11143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.149.231.50  user=root
2019-11-09T16:52:58.818243shield sshd\[11143\]: Failed password for root from 200.149.231.50 port 59338 ssh2
2019-11-10 04:56:55
193.70.114.154 attackspam
Nov  9 16:56:44 OneL sshd\[21917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.114.154  user=root
Nov  9 16:56:47 OneL sshd\[21917\]: Failed password for root from 193.70.114.154 port 53694 ssh2
Nov  9 17:00:16 OneL sshd\[22009\]: Invalid user cse from 193.70.114.154 port 43575
Nov  9 17:00:16 OneL sshd\[22009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.114.154
Nov  9 17:00:17 OneL sshd\[22009\]: Failed password for invalid user cse from 193.70.114.154 port 43575 ssh2
...
2019-11-10 05:11:04
106.13.43.117 attackbots
no
2019-11-10 05:14:42
117.191.67.213 attackbotsspam
Nov  9 17:14:52 MK-Soft-Root1 sshd[11546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.191.67.213 
Nov  9 17:14:54 MK-Soft-Root1 sshd[11546]: Failed password for invalid user yj from 117.191.67.213 port 24645 ssh2
...
2019-11-10 05:15:19
222.186.175.148 attackbotsspam
Nov  9 18:18:33 mail sshd[4278]: Failed password for root from 222.186.175.148 port 59604 ssh2
Nov  9 18:18:38 mail sshd[4278]: Failed password for root from 222.186.175.148 port 59604 ssh2
Nov  9 18:18:42 mail sshd[4278]: Failed password for root from 222.186.175.148 port 59604 ssh2
Nov  9 18:18:49 mail sshd[4278]: Failed password for root from 222.186.175.148 port 59604 ssh2
2019-11-10 05:05:07
106.13.7.253 attackbots
Nov  9 15:22:54 plusreed sshd[25851]: Invalid user Raino from 106.13.7.253
...
2019-11-10 04:42:22
179.57.127.142 attack
Unauthorized connection attempt from IP address 179.57.127.142 on Port 445(SMB)
2019-11-10 05:02:30

Recently Reported IPs

127.6.116.177 150.111.182.135 144.107.40.87 40.254.69.181
233.112.77.193 14.252.26.103 153.121.225.131 64.224.124.232
77.179.117.13 233.164.217.38 150.26.171.79 179.158.45.104
233.25.137.120 32.1.144.136 181.16.213.195 226.170.233.205
20.42.179.105 236.167.5.102 187.7.193.81 93.109.119.183