Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.201.12.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.201.12.61.			IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:50:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 61.12.201.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.12.201.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.99.36.76 attackspambots
2019-08-27T01:14:50.727861abusebot.cloudsearch.cf sshd\[16337\]: Invalid user myftp from 192.99.36.76 port 36796
2019-08-27T01:14:50.732690abusebot.cloudsearch.cf sshd\[16337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ssd2.htm-mbs.com
2019-08-27 09:32:03
106.51.66.214 attackbotsspam
Aug 27 07:29:36 lcl-usvr-01 sshd[21914]: Invalid user test9 from 106.51.66.214
Aug 27 07:29:36 lcl-usvr-01 sshd[21914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214 
Aug 27 07:29:36 lcl-usvr-01 sshd[21914]: Invalid user test9 from 106.51.66.214
Aug 27 07:29:38 lcl-usvr-01 sshd[21914]: Failed password for invalid user test9 from 106.51.66.214 port 45850 ssh2
Aug 27 07:39:10 lcl-usvr-01 sshd[24991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.66.214  user=root
Aug 27 07:39:13 lcl-usvr-01 sshd[24991]: Failed password for root from 106.51.66.214 port 59600 ssh2
2019-08-27 09:33:34
195.206.105.217 attackbots
2019-08-27T01:52:33.079333abusebot.cloudsearch.cf sshd\[17124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=zrh-exit.privateinternetaccess.com  user=sshd
2019-08-27 10:06:28
118.89.228.74 attackbotsspam
Aug 27 04:36:39 server sshd\[12564\]: Invalid user tomas from 118.89.228.74 port 45342
Aug 27 04:36:39 server sshd\[12564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.228.74
Aug 27 04:36:41 server sshd\[12564\]: Failed password for invalid user tomas from 118.89.228.74 port 45342 ssh2
Aug 27 04:40:37 server sshd\[19207\]: Invalid user frida from 118.89.228.74 port 52620
Aug 27 04:40:37 server sshd\[19207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.228.74
2019-08-27 09:54:19
180.250.210.165 attackbotsspam
Aug 26 21:20:27 TORMINT sshd\[28975\]: Invalid user hugo from 180.250.210.165
Aug 26 21:20:27 TORMINT sshd\[28975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.210.165
Aug 26 21:20:29 TORMINT sshd\[28975\]: Failed password for invalid user hugo from 180.250.210.165 port 45829 ssh2
...
2019-08-27 09:35:13
193.32.160.139 attack
MagicSpam Rule: Excessive Mail Rate Inbound; Spammer IP: 193.32.160.139
2019-08-27 10:09:58
200.69.70.30 attack
/wp-login.php
2019-08-27 09:31:23
103.243.143.150 attack
Aug 27 03:31:07 mout sshd[27075]: Invalid user bmedina from 103.243.143.150 port 31893
2019-08-27 09:47:27
138.68.155.9 attackspambots
Aug 27 01:33:33 web8 sshd\[18953\]: Invalid user sikha from 138.68.155.9
Aug 27 01:33:33 web8 sshd\[18953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.9
Aug 27 01:33:35 web8 sshd\[18953\]: Failed password for invalid user sikha from 138.68.155.9 port 12341 ssh2
Aug 27 01:37:48 web8 sshd\[21121\]: Invalid user tranz from 138.68.155.9
Aug 27 01:37:48 web8 sshd\[21121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.9
2019-08-27 09:40:42
157.230.110.11 attackbotsspam
frenzy
2019-08-27 10:08:56
171.25.193.20 attackspambots
Aug 27 03:46:25 MK-Soft-Root1 sshd\[23276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.20  user=sshd
Aug 27 03:46:27 MK-Soft-Root1 sshd\[23276\]: Failed password for sshd from 171.25.193.20 port 39656 ssh2
Aug 27 03:46:27 MK-Soft-Root1 sshd\[23276\]: Failed password for sshd from 171.25.193.20 port 39656 ssh2
...
2019-08-27 09:53:44
180.76.110.14 attackbots
Aug 27 03:03:58 lnxmysql61 sshd[11885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.110.14
2019-08-27 09:38:42
162.247.72.199 attackspam
Aug 27 03:48:13 tux-35-217 sshd\[3112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199  user=sshd
Aug 27 03:48:15 tux-35-217 sshd\[3112\]: Failed password for sshd from 162.247.72.199 port 43662 ssh2
Aug 27 03:48:16 tux-35-217 sshd\[3112\]: Failed password for sshd from 162.247.72.199 port 43662 ssh2
Aug 27 03:48:19 tux-35-217 sshd\[3112\]: Failed password for sshd from 162.247.72.199 port 43662 ssh2
...
2019-08-27 09:50:47
185.241.55.131 attackspam
Aug 26 15:27:45 lcdev sshd\[20765\]: Invalid user rosemarie from 185.241.55.131
Aug 26 15:27:45 lcdev sshd\[20765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.241.55.131
Aug 26 15:27:47 lcdev sshd\[20765\]: Failed password for invalid user rosemarie from 185.241.55.131 port 45676 ssh2
Aug 26 15:31:45 lcdev sshd\[21119\]: Invalid user ste from 185.241.55.131
Aug 26 15:31:45 lcdev sshd\[21119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.241.55.131
2019-08-27 09:43:37
181.40.66.179 attackbotsspam
Aug 27 03:33:38 localhost sshd\[22089\]: Invalid user camelia from 181.40.66.179 port 59368
Aug 27 03:33:38 localhost sshd\[22089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.66.179
Aug 27 03:33:40 localhost sshd\[22089\]: Failed password for invalid user camelia from 181.40.66.179 port 59368 ssh2
2019-08-27 09:40:08

Recently Reported IPs

104.201.14.71 104.201.20.38 104.201.15.71 104.201.20.42
104.201.20.36 104.201.21.35 104.201.21.36 104.201.20.46
101.109.22.55 104.201.22.18 104.201.20.44 104.201.21.44
104.201.20.41 104.201.21.40 104.201.22.20 104.201.22.24
101.109.22.59 104.201.24.10 104.201.24.2 104.201.24.6