Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.125.55.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.125.55.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 18:47:31 CST 2025
;; MSG SIZE  rcvd: 104
Host info
2.55.125.61.in-addr.arpa domain name pointer g2.61-125-55.ppp.wakwak.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.55.125.61.in-addr.arpa	name = g2.61-125-55.ppp.wakwak.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.85.163.46 attack
2020-06-02T06:57:49.839829linuxbox-skyline sshd[89126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.163.46  user=root
2020-06-02T06:57:52.249480linuxbox-skyline sshd[89126]: Failed password for root from 190.85.163.46 port 55166 ssh2
...
2020-06-02 21:01:27
112.134.19.74 attackbots
Attempts against non-existent wp-login
2020-06-02 20:51:44
112.85.42.188 attackbotsspam
06/02/2020-08:23:16.368894 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-02 20:25:33
23.97.180.45 attackspambots
2020-06-02T12:01:23.644164shield sshd\[22433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45  user=root
2020-06-02T12:01:25.546844shield sshd\[22433\]: Failed password for root from 23.97.180.45 port 40379 ssh2
2020-06-02T12:05:11.908912shield sshd\[22921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45  user=root
2020-06-02T12:05:13.445871shield sshd\[22921\]: Failed password for root from 23.97.180.45 port 43382 ssh2
2020-06-02T12:08:54.095210shield sshd\[23447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45  user=root
2020-06-02 20:24:09
223.17.84.52 attackspambots
May 31 17:06:56 fhem-rasp sshd[27047]: Connection closed by invalid user admin 223.17.84.52 port 32850 [preauth]
Jun  2 14:08:50 fhem-rasp sshd[8189]: Invalid user netman from 223.17.84.52 port 39688
...
2020-06-02 20:26:55
23.236.231.237 attackspam
Registration form abuse
2020-06-02 20:32:10
104.236.137.194 attack
2020-06-02T13:54:15.221144v22018076590370373 sshd[5699]: Failed password for root from 104.236.137.194 port 53818 ssh2
2020-06-02T14:01:34.432638v22018076590370373 sshd[24246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.137.194  user=root
2020-06-02T14:01:36.512005v22018076590370373 sshd[24246]: Failed password for root from 104.236.137.194 port 56482 ssh2
2020-06-02T14:08:40.158959v22018076590370373 sshd[7729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.137.194  user=root
2020-06-02T14:08:42.388628v22018076590370373 sshd[7729]: Failed password for root from 104.236.137.194 port 59142 ssh2
...
2020-06-02 20:41:06
201.219.50.217 attackbots
Lines containing failures of 201.219.50.217
Jun  1 20:00:35 g sshd[7731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.50.217  user=r.r
Jun  1 20:00:37 g sshd[7731]: Failed password for r.r from 201.219.50.217 port 57752 ssh2
Jun  1 20:00:37 g sshd[7731]: Received disconnect from 201.219.50.217 port 57752:11: Bye Bye [preauth]
Jun  1 20:00:37 g sshd[7731]: Disconnected from authenticating user r.r 201.219.50.217 port 57752 [preauth]
Jun  1 20:05:16 g sshd[7785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.50.217  user=r.r
Jun  1 20:05:18 g sshd[7785]: Failed password for r.r from 201.219.50.217 port 44962 ssh2
Jun  1 20:05:18 g sshd[7785]: Received disconnect from 201.219.50.217 port 44962:11: Bye Bye [preauth]
Jun  1 20:05:18 g sshd[7785]: Disconnected from authenticating user r.r 201.219.50.217 port 44962 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.
2020-06-02 20:55:35
181.129.161.28 attackbotsspam
2020-06-02T13:58:49.579909ns386461 sshd\[15235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28  user=root
2020-06-02T13:58:52.010088ns386461 sshd\[15235\]: Failed password for root from 181.129.161.28 port 48528 ssh2
2020-06-02T14:04:55.605674ns386461 sshd\[20782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28  user=root
2020-06-02T14:04:57.613060ns386461 sshd\[20782\]: Failed password for root from 181.129.161.28 port 47362 ssh2
2020-06-02T14:08:47.612478ns386461 sshd\[24725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28  user=root
...
2020-06-02 20:30:53
122.55.42.241 attackbotsspam
 TCP (SYN) 122.55.42.241:5676 -> port 23, len 40
2020-06-02 20:58:34
159.138.65.33 attackbotsspam
Jun  2 02:20:20 web9 sshd\[24582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.65.33  user=root
Jun  2 02:20:23 web9 sshd\[24582\]: Failed password for root from 159.138.65.33 port 44506 ssh2
Jun  2 02:23:19 web9 sshd\[24911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.65.33  user=root
Jun  2 02:23:21 web9 sshd\[24911\]: Failed password for root from 159.138.65.33 port 39862 ssh2
Jun  2 02:26:18 web9 sshd\[25259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.65.33  user=root
2020-06-02 20:30:23
120.229.1.203 attackbots
Jun  2 17:51:36 gw1 sshd[31176]: Failed password for root from 120.229.1.203 port 13871 ssh2
...
2020-06-02 20:59:17
49.234.28.109 attackbots
Jun  2 02:03:17 web9 sshd\[22483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109  user=root
Jun  2 02:03:19 web9 sshd\[22483\]: Failed password for root from 49.234.28.109 port 39980 ssh2
Jun  2 02:06:03 web9 sshd\[22825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109  user=root
Jun  2 02:06:04 web9 sshd\[22825\]: Failed password for root from 49.234.28.109 port 43458 ssh2
Jun  2 02:08:55 web9 sshd\[23185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109  user=root
2020-06-02 20:21:57
122.51.39.232 attack
5x Failed Password
2020-06-02 20:43:13
81.133.142.45 attackbots
20 attempts against mh-ssh on cloud
2020-06-02 21:00:55

Recently Reported IPs

153.95.243.138 180.213.33.170 92.243.83.161 57.194.1.1
60.40.158.76 18.31.241.94 46.129.252.131 54.124.160.42
91.145.113.243 227.89.64.169 78.232.69.134 244.210.234.22
20.165.222.82 23.181.145.45 159.170.125.214 227.68.205.221
163.245.35.19 201.2.191.61 99.35.62.227 142.181.182.71