Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.45.106.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.45.106.61.			IN	A

;; AUTHORITY SECTION:
.			164	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024061100 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 11 21:09:41 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 61.106.45.131.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.106.45.131.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
123.129.155.132 attackbots
Automatic report - Port Scan Attack
2020-09-29 07:25:49
60.54.89.217 spamattackproxy
This ip hacking website.blacklist this user id.location petaling Jaya.
2020-09-29 11:42:21
107.189.11.160 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-09-29 07:15:11
168.0.174.218 attack
Automatic report - Banned IP Access
2020-09-29 07:24:12
116.1.149.196 attack
SSH login attempts.
2020-09-29 07:04:51
45.129.33.81 attackbotsspam
[MK-VM3] Blocked by UFW
2020-09-29 07:05:17
123.8.15.63 attackbots
port scan and connect, tcp 23 (telnet)
2020-09-29 12:02:47
192.241.239.251 attackspambots
Port scan detected
2020-09-29 12:05:20
45.129.33.40 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 30424 proto: tcp cat: Misc Attackbytes: 60
2020-09-29 07:06:32
45.227.254.30 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 6503 proto: tcp cat: Misc Attackbytes: 60
2020-09-29 07:02:22
165.22.246.254 attack
 TCP (SYN) 165.22.246.254:32767 -> port 8545, len 44
2020-09-29 07:22:25
168.63.137.51 attack
Sep 28 15:19:15 propaganda sshd[93045]: Connection from 168.63.137.51 port 1664 on 10.0.0.161 port 22 rdomain ""
Sep 28 15:19:15 propaganda sshd[93045]: Connection closed by 168.63.137.51 port 1664 [preauth]
2020-09-29 07:04:24
45.178.0.163 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-09-29 07:02:55
177.1.214.84 attack
Sep 29 00:23:20 pornomens sshd\[11492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84  user=root
Sep 29 00:23:22 pornomens sshd\[11492\]: Failed password for root from 177.1.214.84 port 58458 ssh2
Sep 29 00:27:50 pornomens sshd\[11558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84  user=root
...
2020-09-29 07:14:48
180.76.149.15 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-09-29 07:16:41

Recently Reported IPs

31.132.229.84 35.202.131.246 2003:d7:4f4d:af00:90c:189c:398b:8666 197.127.19.164
240.18.114.223 3.177.185.199 168.129.238.58 248.28.254.140
161.152.196.222 228.22.166.76 33.12.91.18 231.199.129.62
213.105.38.221 248.126.196.151 6.102.76.133 23.46.97.26
209.246.123.122 242.24.239.170 170.153.42.132 252.57.20.224