Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: KDDI CORPORATION

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.204.130.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64865
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.204.130.75.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070201 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 03 03:48:24 CST 2019
;; MSG SIZE  rcvd: 117
Host info
75.130.204.61.in-addr.arpa domain name pointer 3dcc824b.tcat.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
75.130.204.61.in-addr.arpa	name = 3dcc824b.tcat.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.203.105.253 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-30 22:50:19
103.219.112.47 attack
Unauthorized connection attempt detected from IP address 103.219.112.47 to port 2220 [J]
2020-01-30 23:20:44
182.16.172.30 attack
Unauthorized connection attempt detected from IP address 182.16.172.30 to port 80 [J]
2020-01-30 23:14:54
142.44.251.207 attackspam
Jan 30 10:35:08 firewall sshd[27774]: Invalid user mirza from 142.44.251.207
Jan 30 10:35:09 firewall sshd[27774]: Failed password for invalid user mirza from 142.44.251.207 port 45214 ssh2
Jan 30 10:37:46 firewall sshd[27882]: Invalid user moti from 142.44.251.207
...
2020-01-30 22:52:59
222.136.242.252 attackbots
23/tcp
[2020-01-30]1pkt
2020-01-30 23:03:35
98.177.153.53 attack
Honeypot attack, port: 5555, PTR: ip98-177-153-53.ph.ph.cox.net.
2020-01-30 22:53:15
222.186.180.6 attackbotsspam
Jan 30 15:32:17 MK-Soft-VM3 sshd[16676]: Failed password for root from 222.186.180.6 port 43566 ssh2
Jan 30 15:32:22 MK-Soft-VM3 sshd[16676]: Failed password for root from 222.186.180.6 port 43566 ssh2
...
2020-01-30 22:53:49
104.152.52.27 attack
Unauthorized connection attempt detected from IP address 104.152.52.27 to port 691
2020-01-30 22:48:38
203.223.44.214 attack
Unauthorized connection attempt detected from IP address 203.223.44.214 to port 8080 [J]
2020-01-30 23:12:14
63.82.50.247 attackspam
Thu Jan 30 14:37:42 CET 2020: Mail Spammer
2020-01-30 22:58:08
42.117.20.222 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-30 23:09:40
197.156.80.240 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-30 22:45:41
117.5.47.170 attackspambots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-30 22:44:45
134.209.155.232 attackspambots
RDP Bruteforce
2020-01-30 23:16:38
42.117.20.54 attackbots
Unauthorized connection attempt detected from IP address 42.117.20.54 to port 23 [J]
2020-01-30 23:10:10

Recently Reported IPs

139.0.4.194 12.105.201.155 4.167.43.254 126.68.56.150
214.160.217.72 39.83.194.162 121.85.2.155 185.22.142.11
55.15.131.76 99.242.157.78 128.251.187.227 98.16.112.112
175.114.6.6 86.107.190.214 205.185.114.167 137.70.203.116
77.40.62.212 161.134.159.224 202.225.83.39 12.243.104.106