Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toyosu

Region: Tokyo

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.204.139.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 735
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.204.139.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 414 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:50:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
0.139.204.61.in-addr.arpa domain name pointer 3dcc8b00.tcat.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
0.139.204.61.in-addr.arpa	name = 3dcc8b00.tcat.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.10.102.182 attack
Unauthorized connection attempt from IP address 186.10.102.182 on Port 445(SMB)
2020-05-08 20:21:06
162.243.144.220 attackspam
Unauthorized connection attempt detected from IP address 162.243.144.220 to port 2525
2020-05-08 20:00:45
195.53.63.194 attackspambots
Brute force SMTP login attempted.
...
2020-05-08 20:40:36
213.198.10.251 attackspambots
frenzy
2020-05-08 20:06:23
193.31.118.241 attackbotsspam
fake offers
From: "Health Smart Watch" 
Date: Thu, 07 May 2020 22:31:30 -0500
Received: from punishdevelop.icu (unknown [193.31.118.241])
2020-05-08 20:16:44
95.216.1.46 attackbotsspam
20 attempts against mh-misbehave-ban on twig
2020-05-08 20:36:19
49.235.15.230 attackspambots
$f2bV_matches
2020-05-08 20:14:33
218.92.0.190 attack
May  8 14:35:36 dcd-gentoo sshd[1380]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
May  8 14:35:38 dcd-gentoo sshd[1380]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
May  8 14:35:38 dcd-gentoo sshd[1380]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.190 port 58900 ssh2
...
2020-05-08 20:38:24
212.64.29.136 attackbots
20 attempts against mh-ssh on install-test
2020-05-08 20:34:53
51.210.15.5 attackspam
2020-05-08T06:15:58.155500linuxbox-skyline sshd[21828]: Invalid user bob from 51.210.15.5 port 35476
...
2020-05-08 20:20:46
222.186.169.194 attackspam
2020-05-08T14:27:12.747224centos sshd[24465]: Failed password for root from 222.186.169.194 port 32802 ssh2
2020-05-08T14:27:17.753269centos sshd[24465]: Failed password for root from 222.186.169.194 port 32802 ssh2
2020-05-08T14:27:22.763383centos sshd[24465]: Failed password for root from 222.186.169.194 port 32802 ssh2
...
2020-05-08 20:28:39
37.120.217.23 attack
REQUESTED PAGE: /Scripts/sendform.php
2020-05-08 20:23:03
187.150.40.126 attackspam
Unauthorized connection attempt detected from IP address 187.150.40.126 to port 23
2020-05-08 20:05:00
180.169.129.180 attack
May  8 06:30:54 IngegnereFirenze sshd[28501]: Failed password for invalid user wasadmin from 180.169.129.180 port 37466 ssh2
...
2020-05-08 19:57:47
34.209.248.134 attackspam
ping sweep
2020-05-08 20:07:38

Recently Reported IPs

198.185.250.36 18.194.250.23 127.147.155.104 198.146.216.56
131.87.229.8 6.9.79.16 20.225.107.51 94.103.41.215
56.211.219.48 199.51.138.127 25.2.97.224 60.50.121.83
64.14.177.198 16.91.184.127 87.248.235.55 207.167.93.165
60.204.173.92 42.8.238.39 33.15.155.191 253.72.0.207