Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '163.61.199.0 - 163.61.199.255'

% Abuse contact for '163.61.199.0 - 163.61.199.255' is 'noc@auk.sg'

inetnum:        163.61.199.0 - 163.61.199.255
netname:        AUK-HomeFiber
descr:          AUK HomeFiber
country:        SG
admin-c:        SATP1-AP
tech-c:         SATP1-AP
abuse-c:        AS3808-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-SATPL-SG
mnt-irt:        IRT-SATPL-SG
last-modified:  2025-02-22T16:52:21Z
source:         APNIC

irt:            IRT-SATPL-SG
address:        2 VENTURE DRIVE,
e-mail:         noc@auk.sg
abuse-mailbox:  noc@auk.sg
admin-c:        SATP1-AP
tech-c:         SATP1-AP
auth:           # Filtered
remarks:        noc@auk.sg was validated on 2025-09-02
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-11-18T00:38:10Z
source:         APNIC

role:           ABUSE SATPLSG
country:        ZZ
address:        2 VENTURE DRIVE,
phone:          +000000000
e-mail:         noc@auk.sg
admin-c:        SATP1-AP
tech-c:         SATP1-AP
nic-hdl:        AS3808-AP
remarks:        Generated from irt object IRT-SATPL-SG
remarks:        noc@auk.sg was validated on 2025-09-02
abuse-mailbox:  noc@auk.sg
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T16:31:18Z
source:         APNIC

role:           SOUTHEAST ASIA TELECOMSG PTE LTD administrator
address:        2 VENTURE DRIVE, #19-21 VISION EXCHANGE, SINGAPORE SINGAPORE 608526
country:        SG
phone:          +65-89167576
e-mail:         noc@auk.sg
admin-c:        SATP1-AP
tech-c:         SATP1-AP
nic-hdl:        SATP1-AP
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-02-20T01:30:24Z
source:         APNIC

% Information related to '163.61.199.0/24AS152179'

route:          163.61.199.0/24
origin:         AS152179
descr:          SOUTHEAST ASIA TELECOM(SG) PTE. LTD.
                2 VENTURE DRIVE
                #19-21 VISION EXCHANGE
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-05-06T18:13:33Z
source:         APNIC

% Information related to '163.61.199.0/24AS9664'

route:          163.61.199.0/24
origin:         AS9664
descr:          SOUTHEAST ASIA TELECOM(SG) PTE. LTD.
                2 VENTURE DRIVE
                #19-21 VISION EXCHANGE
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-02-20T12:42:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.61.199.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.61.199.161.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 08 22:52:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
161.199.61.163.in-addr.arpa domain name pointer 163-61-199-161.home-fiber.auk.sg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.199.61.163.in-addr.arpa	name = 163-61-199-161.home-fiber.auk.sg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
168.63.245.27 attackspambots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-26 15:29:10
180.253.27.245 attackspam
1593143611 - 06/26/2020 05:53:31 Host: 180.253.27.245/180.253.27.245 Port: 445 TCP Blocked
2020-06-26 15:31:31
107.173.51.220 attack
(From fhenderson459@gmail.com) Hi!

Have you tried searching on Google for the products/services your website offers? Does your business site appear on the first page? I'm an expert Online Marketing Analyst, and I know exactly how to improve your website's rank in search engines. If you're not appearing on the top of search results, you're inevitably missing out on a lot of opportunities. This is because your potential clients are having a difficult time finding you online since they can't find you on the first page of search results. 

I've been in the field of SEO for over a decade now and I can help you fix that. I'm offering you a free consultation, so I can show you how the optimization can make your website rank higher on Google and other search engines. Kindly let me know if you're interested and I can give you a call at a time that works best for you. I look forward to speaking with you soon. 

 
Sincerely,
Frank Henderson
2020-06-26 15:11:46
69.168.97.50 attack
prostitution
2020-06-26 15:24:25
36.75.15.26 attackbotsspam
1593143607 - 06/26/2020 05:53:27 Host: 36.75.15.26/36.75.15.26 Port: 445 TCP Blocked
2020-06-26 15:35:00
222.186.15.62 attackbots
Jun 26 09:29:08 * sshd[9611]: Failed password for root from 222.186.15.62 port 18318 ssh2
Jun 26 09:29:11 * sshd[9611]: Failed password for root from 222.186.15.62 port 18318 ssh2
2020-06-26 15:30:23
94.25.181.60 attack
Brute force attempt
2020-06-26 15:01:59
84.235.40.97 attackbotsspam
20/6/25@23:53:26: FAIL: Alarm-Network address from=84.235.40.97
...
2020-06-26 15:34:01
191.17.16.23 attack
Jun 26 06:07:34 ip-172-31-61-156 sshd[25156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.17.16.23  user=ubuntu
Jun 26 06:07:36 ip-172-31-61-156 sshd[25156]: Failed password for ubuntu from 191.17.16.23 port 35780 ssh2
Jun 26 06:11:33 ip-172-31-61-156 sshd[25441]: Invalid user kmk from 191.17.16.23
Jun 26 06:11:33 ip-172-31-61-156 sshd[25441]: Invalid user kmk from 191.17.16.23
...
2020-06-26 15:28:20
46.38.145.254 attackbotsspam
2020-06-26 07:07:20 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=util@csmailer.org)
2020-06-26 07:08:04 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=pgotowe@csmailer.org)
2020-06-26 07:08:51 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=mood@csmailer.org)
2020-06-26 07:09:33 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=hornet@csmailer.org)
2020-06-26 07:10:23 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=poems@csmailer.org)
...
2020-06-26 15:15:08
218.78.48.37 attackspam
Jun 26 09:02:51 mail sshd\[29885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.48.37  user=root
Jun 26 09:02:53 mail sshd\[29885\]: Failed password for root from 218.78.48.37 port 44724 ssh2
Jun 26 09:12:38 mail sshd\[30216\]: Invalid user webmaster from 218.78.48.37
Jun 26 09:12:38 mail sshd\[30216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.48.37
Jun 26 09:12:40 mail sshd\[30216\]: Failed password for invalid user webmaster from 218.78.48.37 port 39272 ssh2
...
2020-06-26 15:28:06
89.228.9.34 attack
Port probing on unauthorized port 23
2020-06-26 15:37:02
58.213.76.154 attackbotsspam
Jun 26 06:09:53 serwer sshd\[19457\]: Invalid user servers from 58.213.76.154 port 55619
Jun 26 06:09:53 serwer sshd\[19457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.76.154
Jun 26 06:09:54 serwer sshd\[19457\]: Failed password for invalid user servers from 58.213.76.154 port 55619 ssh2
...
2020-06-26 15:37:59
177.69.237.54 attack
Jun 26 07:01:58 onepixel sshd[3448123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.54 
Jun 26 07:01:58 onepixel sshd[3448123]: Invalid user sinusbot from 177.69.237.54 port 51302
Jun 26 07:02:00 onepixel sshd[3448123]: Failed password for invalid user sinusbot from 177.69.237.54 port 51302 ssh2
Jun 26 07:06:48 onepixel sshd[3451222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.54  user=root
Jun 26 07:06:50 onepixel sshd[3451222]: Failed password for root from 177.69.237.54 port 50002 ssh2
2020-06-26 15:33:20
118.71.97.214 attackspam
1593143641 - 06/26/2020 05:54:01 Host: 118.71.97.214/118.71.97.214 Port: 445 TCP Blocked
2020-06-26 15:08:41

Recently Reported IPs

204.76.203.40 66.249.77.98 213.209.157.95 147.185.132.20
240e:338:9219:edb0:ddd9:81e7:d5e1:5454 36.41.66.49 217.64.149.181 58.247.150.100
199.127.63.154 1.15.52.154 54.156.160.91 176.65.132.157
169.150.207.234 168.160.170.7 146.190.23.179 23.95.68.31
163.61.199.171 5.187.35.158 192.204.43.10 59.217.254.123