Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.61.0.0 - 195.61.255.255'

% Abuse contact for '195.61.0.0 - 195.61.255.255' is 'trustandsafety@support.aws.com'

inetnum:        195.61.0.0 - 195.61.255.255
netname:        US-A100ROW-19961227
country:        DE
org:            ORG-ARI3-RIPE
admin-c:        IM4726-RIPE
tech-c:         IM4726-RIPE
status:         ALLOCATED PA
mnt-by:         MNT-ADSI
mnt-by:         RIPE-NCC-HM-MNT
created:        2021-04-13T06:52:44Z
last-modified:  2021-04-13T06:52:44Z
source:         RIPE

organisation:   ORG-ARI3-RIPE
org-name:       A100 ROW Inc
country:        US
org-type:       LIR
address:        Marcel-Breuer-Strasse 12
address:        80807
address:        Munchen
address:        GERMANY
phone:          +4994178878008
admin-c:        IM4726-RIPE
tech-c:         IM4726-RIPE
abuse-c:        AWSA3-RIPE
mnt-ref:        MNT-ADSI
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         MNT-ADSI
mnt-by:         RIPE-NCC-HM-MNT
created:        2015-12-08T10:45:00Z
last-modified:  2024-03-21T15:40:25Z
source:         RIPE # Filtered

person:         IP Man
address:        Marcel-Breuer-Strasse 12
address:        80807
address:        Munchen
address:        GERMANY
phone:          +4994178878008
nic-hdl:        IM4726-RIPE
mnt-by:         us-a100row-1-mnt
created:        2015-12-08T10:44:59Z
last-modified:  2015-12-08T10:45:00Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.61.113.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.61.113.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 23:02:15 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 139.113.61.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.113.61.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.150.180.171 attackspam
Unauthorised access (Aug  6) SRC=201.150.180.171 LEN=52 TOS=0x10 PREC=0x40 TTL=116 ID=10614 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-07 01:07:25
5.135.101.228 attack
Aug  6 17:29:12 Ubuntu-1404-trusty-64-minimal sshd\[3168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.101.228  user=root
Aug  6 17:29:15 Ubuntu-1404-trusty-64-minimal sshd\[3168\]: Failed password for root from 5.135.101.228 port 39002 ssh2
Aug  6 17:33:29 Ubuntu-1404-trusty-64-minimal sshd\[9900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.101.228  user=root
Aug  6 17:33:31 Ubuntu-1404-trusty-64-minimal sshd\[9900\]: Failed password for root from 5.135.101.228 port 53148 ssh2
Aug  6 17:35:20 Ubuntu-1404-trusty-64-minimal sshd\[11110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.101.228  user=root
2020-08-07 01:28:08
159.203.30.50 attackspambots
...
2020-08-07 01:24:58
103.228.144.163 attackspambots
Aug  6 14:11:48 our-server-hostname sshd[7279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.144.163  user=r.r
Aug  6 14:11:50 our-server-hostname sshd[7279]: Failed password for r.r from 103.228.144.163 port 60398 ssh2
Aug  6 14:20:41 our-server-hostname sshd[9484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.144.163  user=r.r
Aug  6 14:20:43 our-server-hostname sshd[9484]: Failed password for r.r from 103.228.144.163 port 44092 ssh2
Aug  6 14:26:42 our-server-hostname sshd[10951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.144.163  user=r.r
Aug  6 14:26:44 our-server-hostname sshd[10951]: Failed password for r.r from 103.228.144.163 port 37332 ssh2
Aug  6 14:32:51 our-server-hostname sshd[12711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.144.163  user=r.r
Aug  6........
-------------------------------
2020-08-07 01:14:13
103.145.13.5 attack
 UDP 103.145.13.5:5364 -> port 1026, len 426
2020-08-07 01:00:32
180.97.80.246 attackbotsspam
Aug  6 21:34:50 webhost01 sshd[15122]: Failed password for root from 180.97.80.246 port 57528 ssh2
...
2020-08-07 00:58:30
51.79.145.158 attackbotsspam
...
2020-08-07 01:25:56
123.207.211.71 attack
SSH Login Bruteforce
2020-08-07 01:16:07
49.235.141.203 attackbots
[Mon Jul 13 19:06:19 2020] - DDoS Attack From IP: 49.235.141.203 Port: 57865
2020-08-07 01:33:31
51.38.64.8 attackspam
*Port Scan* detected from 51.38.64.8 (GB/United Kingdom/England/Purfleet/vps-8e40a385.vps.ovh.net). 4 hits in the last 40 seconds
2020-08-07 01:37:36
94.102.51.77 attackspam
Aug  6 19:14:59 debian-2gb-nbg1-2 kernel: \[18992554.058033\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.77 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=30970 PROTO=TCP SPT=45665 DPT=8821 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-07 01:23:52
185.220.101.206 attackspam
Aug  6 15:22:42 ourumov-web sshd\[672\]: Invalid user admin from 185.220.101.206 port 26300
Aug  6 15:22:42 ourumov-web sshd\[672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.206
Aug  6 15:22:45 ourumov-web sshd\[672\]: Failed password for invalid user admin from 185.220.101.206 port 26300 ssh2
...
2020-08-07 01:15:06
106.13.185.97 attackbotsspam
Aug  6 19:15:04 mout sshd[26519]: Disconnected from authenticating user root 106.13.185.97 port 57318 [preauth]
Aug  6 19:27:15 mout sshd[27427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.185.97  user=root
Aug  6 19:27:17 mout sshd[27427]: Failed password for root from 106.13.185.97 port 38894 ssh2
2020-08-07 01:29:51
189.183.80.122 attackspambots
Automatic report - Port Scan Attack
2020-08-07 01:39:37
61.50.99.26 attack
Aug  6 15:22:48 mout sshd[8986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.50.99.26  user=root
Aug  6 15:22:51 mout sshd[8986]: Failed password for root from 61.50.99.26 port 56889 ssh2
2020-08-07 01:10:54

Recently Reported IPs

2606:4700:10::6816:1474 2606:4700:10::6816:3088 2606:4700:10::6816:453d 2606:4700:10::6816:4362
2606:4700:10::6816:2953 2606:4700:10::6816:3251 2606:4700:10::6816:943 2606:4700:10::6814:7968
2606:4700:10::ac43:2804 2606:4700:10::ac43:2657 2606:4700:10::6816:4439 47.87.70.243
10.27.21.206 103.14.92.2 2606:4700:10::6816:2772 2606:4700:10::6814:5027
2606:4700:10::6816:882 2606:4700:10::6816:4521 2606:4700:10::6814:7455 2606:4700:10::6814:8929