Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Perth

Region: Western Australia

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.245.139.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.245.139.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 12:43:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
143.139.245.61.in-addr.arpa domain name pointer 61-245-139-143.3df58b.per.nbn.aussiebb.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.139.245.61.in-addr.arpa	name = 61-245-139-143.3df58b.per.nbn.aussiebb.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
45.59.126.232 attack
 TCP (SYN) 45.59.126.232:46999 -> port 11211, len 40
2020-06-21 19:47:21
198.206.243.23 attackbotsspam
Jun 21 11:39:32 scw-tender-jepsen sshd[15746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.206.243.23
Jun 21 11:39:35 scw-tender-jepsen sshd[15746]: Failed password for invalid user clj from 198.206.243.23 port 54086 ssh2
2020-06-21 20:07:30
51.178.85.190 attackbots
Jun 21 14:16:35 ns381471 sshd[13551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.85.190
Jun 21 14:16:37 ns381471 sshd[13551]: Failed password for invalid user user from 51.178.85.190 port 37532 ssh2
2020-06-21 20:23:42
120.70.102.239 attackspambots
Invalid user test from 120.70.102.239 port 39074
2020-06-21 20:04:40
113.142.59.3 attackbotsspam
Jun 21 03:45:04 jumpserver sshd[159089]: Invalid user pano from 113.142.59.3 port 48779
Jun 21 03:45:06 jumpserver sshd[159089]: Failed password for invalid user pano from 113.142.59.3 port 48779 ssh2
Jun 21 03:49:03 jumpserver sshd[159112]: Invalid user csserver from 113.142.59.3 port 41446
...
2020-06-21 19:45:15
46.36.40.143 attackspambots
2020-06-21T07:48:34.288422vps773228.ovh.net sshd[4837]: Failed password for invalid user cisco from 46.36.40.143 port 60062 ssh2
2020-06-21T07:51:47.579896vps773228.ovh.net sshd[4887]: Invalid user lisa from 46.36.40.143 port 47044
2020-06-21T07:51:47.598318vps773228.ovh.net sshd[4887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.36.40.143
2020-06-21T07:51:47.579896vps773228.ovh.net sshd[4887]: Invalid user lisa from 46.36.40.143 port 47044
2020-06-21T07:51:49.880253vps773228.ovh.net sshd[4887]: Failed password for invalid user lisa from 46.36.40.143 port 47044 ssh2
...
2020-06-21 20:03:35
36.226.113.65 attackbots
1592711335 - 06/21/2020 05:48:55 Host: 36.226.113.65/36.226.113.65 Port: 445 TCP Blocked
2020-06-21 19:50:14
185.176.27.26 attackbots
scans 9 times in preceeding hours on the ports (in chronological order) 26400 26399 26489 26490 26491 26581 26582 26580 26696 resulting in total of 81 scans from 185.176.27.0/24 block.
2020-06-21 20:25:23
148.71.44.11 attackspam
Invalid user ulia from 148.71.44.11 port 3474
2020-06-21 20:11:47
198.27.64.212 attack
detected by Fail2Ban
2020-06-21 20:24:35
73.41.104.30 attackbots
Jun 21 11:03:58 XXX sshd[26018]: Invalid user jasalu from 73.41.104.30 port 48505
2020-06-21 20:05:30
59.144.139.18 attackbotsspam
Jun 21 12:41:53 ns3164893 sshd[17006]: Failed password for root from 59.144.139.18 port 59744 ssh2
Jun 21 12:44:42 ns3164893 sshd[17056]: Invalid user test from 59.144.139.18 port 59560
...
2020-06-21 20:06:15
219.151.155.247 attack
Jun 21 14:16:35 nextcloud sshd\[30462\]: Invalid user hadi from 219.151.155.247
Jun 21 14:16:35 nextcloud sshd\[30462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.151.155.247
Jun 21 14:16:37 nextcloud sshd\[30462\]: Failed password for invalid user hadi from 219.151.155.247 port 51956 ssh2
2020-06-21 20:20:13
14.189.254.0 attack
Port probing on unauthorized port 445
2020-06-21 19:51:07
94.191.62.195 attack
SSH/22 MH Probe, BF, Hack -
2020-06-21 20:08:27

Recently Reported IPs

90.220.122.70 163.125.135.143 177.249.136.46 1.195.72.220
56.197.104.206 43.76.117.138 133.139.69.161 176.179.147.186
84.166.200.141 174.236.83.93 82.144.245.140 56.195.152.207
112.119.209.3 192.95.212.95 29.119.225.149 13.4.12.140
39.184.171.64 166.48.157.183 97.45.157.154 13.199.253.248