Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.148.13.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.148.13.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 03:53:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
61.13.148.202.in-addr.arpa domain name pointer dnet-013061.dnetsurabaya.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.13.148.202.in-addr.arpa	name = dnet-013061.dnetsurabaya.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.240.208.26 attack
Fail2Ban Ban Triggered
2020-03-19 19:50:58
47.74.49.75 attackspam
SSH login attempts.
2020-03-19 19:58:23
80.232.252.82 attackbotsspam
Mar 19 09:34:26 server sshd\[29691\]: Invalid user gnats from 80.232.252.82
Mar 19 09:34:26 server sshd\[29691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.232.252.82 
Mar 19 09:34:28 server sshd\[29691\]: Failed password for invalid user gnats from 80.232.252.82 port 59294 ssh2
Mar 19 09:55:10 server sshd\[2573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.232.252.82  user=root
Mar 19 09:55:12 server sshd\[2573\]: Failed password for root from 80.232.252.82 port 52308 ssh2
...
2020-03-19 20:03:48
211.197.7.1 attackspambots
(sshd) Failed SSH login from 211.197.7.1 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 11:32:28 s1 sshd[23592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.7.1  user=root
Mar 19 11:32:30 s1 sshd[23592]: Failed password for root from 211.197.7.1 port 54971 ssh2
Mar 19 11:38:19 s1 sshd[23781]: Invalid user user from 211.197.7.1 port 64132
Mar 19 11:38:21 s1 sshd[23781]: Failed password for invalid user user from 211.197.7.1 port 64132 ssh2
Mar 19 11:42:05 s1 sshd[23949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.7.1  user=root
2020-03-19 19:46:25
83.241.232.51 attackspam
Invalid user postgres from 83.241.232.51 port 49727
2020-03-19 19:55:49
41.36.130.189 attack
SSH login attempts.
2020-03-19 19:50:11
156.211.14.151 attack
SSH login attempts.
2020-03-19 20:01:45
103.129.223.149 attackspambots
Mar 19 11:29:06 cp sshd[2485]: Failed password for root from 103.129.223.149 port 38674 ssh2
Mar 19 11:29:06 cp sshd[2485]: Failed password for root from 103.129.223.149 port 38674 ssh2
2020-03-19 19:49:36
120.70.101.46 attackbotsspam
SSH brute force attempt
2020-03-19 20:07:33
213.241.94.66 attackbots
19.03.2020 05:22:31 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-03-19 20:05:23
35.231.211.161 attackbotsspam
Invalid user master from 35.231.211.161 port 44598
2020-03-19 20:26:44
86.105.52.90 attackspambots
Mar 19 10:34:13 mail sshd[22054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.52.90  user=postfix
Mar 19 10:34:14 mail sshd[22054]: Failed password for postfix from 86.105.52.90 port 42274 ssh2
Mar 19 10:45:34 mail sshd[23506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.52.90  user=root
Mar 19 10:45:35 mail sshd[23506]: Failed password for root from 86.105.52.90 port 53398 ssh2
Mar 19 10:52:21 mail sshd[25243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.52.90  user=root
Mar 19 10:52:22 mail sshd[25243]: Failed password for root from 86.105.52.90 port 46428 ssh2
...
2020-03-19 19:36:17
134.19.251.26 attackbots
Unauthorized connection attempt detected from IP address 134.19.251.26 to port 23
2020-03-19 20:23:21
35.159.32.182 attack
SQL Injection Attempts
2020-03-19 20:11:09
27.254.136.29 attackspam
Brute force attempt
2020-03-19 19:54:34

Recently Reported IPs

67.165.53.160 238.205.137.60 139.24.39.87 25.38.217.245
173.31.204.225 90.243.50.63 100.206.148.166 223.10.220.173
94.37.49.107 115.85.60.248 14.44.230.59 39.78.158.52
68.148.136.77 182.179.27.216 54.107.193.247 60.235.200.128
75.226.233.27 88.124.104.17 115.48.103.49 71.25.198.79