Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.3.145.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.3.145.66.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 09:04:58 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 66.145.3.61.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.145.3.61.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.15.97.199 attack
WordPress XMLRPC scan :: 52.15.97.199 0.132 - [30/Jun/2020:12:18:32  0000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-07-01 03:45:04
123.30.149.34 attackspam
Multiple SSH authentication failures from 123.30.149.34
2020-07-01 04:25:03
170.130.68.14 spam
Aggressive email spammer on subnet 170.130.68.*
2020-07-01 04:26:50
203.77.229.114 attackbots
1593519503 - 06/30/2020 14:18:23 Host: 203.77.229.114/203.77.229.114 Port: 445 TCP Blocked
2020-07-01 03:49:50
181.113.26.2 attackspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-07-01 03:58:32
206.189.123.250 attack
2020-06-30T11:18:37.0725141495-001 sshd[47639]: Failed password for root from 206.189.123.250 port 33340 ssh2
2020-06-30T11:21:37.7667801495-001 sshd[47755]: Invalid user csgo-server from 206.189.123.250 port 33510
2020-06-30T11:21:37.7698181495-001 sshd[47755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.123.250
2020-06-30T11:21:37.7667801495-001 sshd[47755]: Invalid user csgo-server from 206.189.123.250 port 33510
2020-06-30T11:21:39.3437451495-001 sshd[47755]: Failed password for invalid user csgo-server from 206.189.123.250 port 33510 ssh2
2020-06-30T11:24:38.0093071495-001 sshd[47824]: Invalid user natasha from 206.189.123.250 port 60526
...
2020-07-01 03:56:01
52.66.197.212 attackspam
Jun 30 16:28:02 Ubuntu-1404-trusty-64-minimal sshd\[28896\]: Invalid user lion from 52.66.197.212
Jun 30 16:28:02 Ubuntu-1404-trusty-64-minimal sshd\[28896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.66.197.212
Jun 30 16:28:04 Ubuntu-1404-trusty-64-minimal sshd\[28896\]: Failed password for invalid user lion from 52.66.197.212 port 34432 ssh2
Jun 30 16:30:37 Ubuntu-1404-trusty-64-minimal sshd\[3062\]: Invalid user jxt from 52.66.197.212
Jun 30 16:30:37 Ubuntu-1404-trusty-64-minimal sshd\[3062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.66.197.212
2020-07-01 04:12:37
171.25.193.77 attackbots
Multiple SSH authentication failures from 171.25.193.77
2020-07-01 04:27:34
170.130.68.6 spam
Aggressive email spammer on subnet 170.130.68.*
2020-07-01 04:27:12
185.220.101.10 attackspambots
Unauthorized connection attempt detected from IP address 185.220.101.10 to port 7000
2020-07-01 03:43:48
217.174.105.16 attackbots
DIS,WP GET /wp-login.php
GET /wp-login.php
2020-07-01 03:47:45
183.6.159.141 attackspambots
Invalid user tos from 183.6.159.141 port 34516
2020-07-01 04:29:23
51.254.141.10 attackbots
Invalid user vbox from 51.254.141.10 port 38074
2020-07-01 03:33:31
177.154.51.67 attackspam
Firewall Dropped Connection
2020-07-01 03:54:52
192.42.116.28 attackspambots
$f2bV_matches
2020-07-01 03:45:21

Recently Reported IPs

61.3.145.105 61.3.146.108 61.3.1.199 61.3.144.146
61.3.144.144 61.3.144.8 61.3.146.151 61.3.145.35
61.3.146.25 61.3.147.111 61.3.146.89 61.3.147.142
61.3.147.28 61.3.148.239 61.3.147.35 61.3.146.63
61.3.148.24 61.3.147.62 61.3.148.254 61.3.149.109