Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '163.61.199.0 - 163.61.199.255'

% Abuse contact for '163.61.199.0 - 163.61.199.255' is 'noc@auk.sg'

inetnum:        163.61.199.0 - 163.61.199.255
netname:        AUK-HomeFiber
descr:          AUK HomeFiber
country:        SG
admin-c:        SATP1-AP
tech-c:         SATP1-AP
abuse-c:        AS3808-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-SATPL-SG
mnt-irt:        IRT-SATPL-SG
last-modified:  2025-02-22T16:52:21Z
source:         APNIC

irt:            IRT-SATPL-SG
address:        2 VENTURE DRIVE,
e-mail:         noc@auk.sg
abuse-mailbox:  noc@auk.sg
admin-c:        SATP1-AP
tech-c:         SATP1-AP
auth:           # Filtered
remarks:        noc@auk.sg was validated on 2025-09-02
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-11-18T00:38:10Z
source:         APNIC

role:           ABUSE SATPLSG
country:        ZZ
address:        2 VENTURE DRIVE,
phone:          +000000000
e-mail:         noc@auk.sg
admin-c:        SATP1-AP
tech-c:         SATP1-AP
nic-hdl:        AS3808-AP
remarks:        Generated from irt object IRT-SATPL-SG
remarks:        noc@auk.sg was validated on 2025-09-02
abuse-mailbox:  noc@auk.sg
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T16:31:18Z
source:         APNIC

role:           SOUTHEAST ASIA TELECOMSG PTE LTD administrator
address:        2 VENTURE DRIVE, #19-21 VISION EXCHANGE, SINGAPORE SINGAPORE 608526
country:        SG
phone:          +65-89167576
e-mail:         noc@auk.sg
admin-c:        SATP1-AP
tech-c:         SATP1-AP
nic-hdl:        SATP1-AP
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-02-20T01:30:24Z
source:         APNIC

% Information related to '163.61.199.0/24AS152179'

route:          163.61.199.0/24
origin:         AS152179
descr:          SOUTHEAST ASIA TELECOM(SG) PTE. LTD.
                2 VENTURE DRIVE
                #19-21 VISION EXCHANGE
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-05-06T18:13:33Z
source:         APNIC

% Information related to '163.61.199.0/24AS9664'

route:          163.61.199.0/24
origin:         AS9664
descr:          SOUTHEAST ASIA TELECOM(SG) PTE. LTD.
                2 VENTURE DRIVE
                #19-21 VISION EXCHANGE
mnt-by:         MAINT-SATPL-SG
last-modified:  2025-02-20T12:42:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.61.199.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.61.199.171.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120800 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 08 22:51:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
171.199.61.163.in-addr.arpa domain name pointer 163-61-199-171.home-fiber.auk.sg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
171.199.61.163.in-addr.arpa	name = 163-61-199-171.home-fiber.auk.sg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.159.24.75 attackbotsspam
" "
2020-07-29 16:29:35
117.33.225.111 attackbots
2020-07-29T05:13:37.005533shield sshd\[11604\]: Invalid user energy from 117.33.225.111 port 47670
2020-07-29T05:13:37.014572shield sshd\[11604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.225.111
2020-07-29T05:13:39.095450shield sshd\[11604\]: Failed password for invalid user energy from 117.33.225.111 port 47670 ssh2
2020-07-29T05:19:26.082608shield sshd\[13922\]: Invalid user v from 117.33.225.111 port 44216
2020-07-29T05:19:26.088914shield sshd\[13922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.225.111
2020-07-29 16:16:58
178.128.125.10 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-29 16:23:40
128.127.90.35 attack
Invalid user liuying from 128.127.90.35 port 56308
2020-07-29 16:08:08
212.159.24.74 attackbotsspam
" "
2020-07-29 16:30:36
179.43.171.190 attackspam
\[Jul 29 18:01:41\] NOTICE\[31025\] chan_sip.c: Registration from '\' failed for '179.43.171.190:49599' - Wrong password
\[Jul 29 18:02:13\] NOTICE\[31025\] chan_sip.c: Registration from '\' failed for '179.43.171.190:63080' - Wrong password
\[Jul 29 18:02:40\] NOTICE\[31025\] chan_sip.c: Registration from '\' failed for '179.43.171.190:58801' - Wrong password
\[Jul 29 18:03:11\] NOTICE\[31025\] chan_sip.c: Registration from '\' failed for '179.43.171.190:56039' - Wrong password
\[Jul 29 18:03:42\] NOTICE\[31025\] chan_sip.c: Registration from '\' failed for '179.43.171.190:53146' - Wrong password
\[Jul 29 18:04:14\] NOTICE\[31025\] chan_sip.c: Registration from '\' failed for '179.43.171.190:49827' - Wrong password
\[Jul 29 18:04:40\] NOTICE\[31025\] chan_sip.c: Registration from '\
2020-07-29 16:20:58
176.74.13.170 attack
k+ssh-bruteforce
2020-07-29 16:24:13
159.89.155.124 attackspambots
Jul 29 06:36:54 XXX sshd[60170]: Invalid user sunyuxiang from 159.89.155.124 port 51372
2020-07-29 16:13:28
222.186.173.183 attackbotsspam
Jul 29 09:39:45 marvibiene sshd[24929]: Failed password for root from 222.186.173.183 port 34262 ssh2
Jul 29 09:39:51 marvibiene sshd[24929]: Failed password for root from 222.186.173.183 port 34262 ssh2
2020-07-29 16:02:10
27.254.206.238 attackspambots
Jul 29 07:01:17 rancher-0 sshd[637095]: Invalid user mssql from 27.254.206.238 port 42060
...
2020-07-29 16:24:52
191.101.84.155 attack
Registration form abuse
2020-07-29 15:46:34
222.186.31.83 attackspam
Jul 29 07:45:24 scw-6657dc sshd[12326]: Failed password for root from 222.186.31.83 port 46261 ssh2
Jul 29 07:45:24 scw-6657dc sshd[12326]: Failed password for root from 222.186.31.83 port 46261 ssh2
Jul 29 07:45:26 scw-6657dc sshd[12326]: Failed password for root from 222.186.31.83 port 46261 ssh2
...
2020-07-29 15:52:03
185.210.218.98 attack
Automatic report - Banned IP Access
2020-07-29 16:13:47
109.169.61.83 attackbots
(smtpauth) Failed SMTP AUTH login from 109.169.61.83 (GB/United Kingdom/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-29 12:25:17 login authenticator failed for (ADMIN) [109.169.61.83]: 535 Incorrect authentication data (set_id=phtd@toliddaru.ir)
2020-07-29 16:15:19
134.175.228.215 attack
Invalid user team3 from 134.175.228.215 port 57878
2020-07-29 15:48:27

Recently Reported IPs

204.76.203.40 66.249.77.98 213.209.157.95 147.185.132.20
240e:338:9219:edb0:ddd9:81e7:d5e1:5454 36.41.66.49 217.64.149.181 58.247.150.100
199.127.63.154 1.15.52.154 54.156.160.91 176.65.132.157
169.150.207.234 168.160.170.7 146.190.23.179 23.95.68.31
163.61.199.161 5.187.35.158 192.204.43.10 59.217.254.123