Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.3.69.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.3.69.104.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:39:09 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 104.69.3.61.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.69.3.61.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
87.251.74.145 attack
ET DROP Dshield Block Listed Source group 1 - port: 22744 proto: TCP cat: Misc Attack
2020-06-21 08:03:03
45.143.220.116 attackspam
Scanned 3 times in the last 24 hours on port 5060
2020-06-21 08:08:18
106.13.221.4 attack
Unauthorised access (Jun 20) SRC=106.13.221.4 LEN=52 TOS=0x02 TTL=115 ID=2709 DF TCP DPT=445 WINDOW=8192 CWR ECE SYN
2020-06-21 08:09:16
93.92.131.194 attackbots
Honeypot attack, port: 445, PTR: rzlup.sinumx.com.
2020-06-21 08:14:07
51.161.12.231 attack
GB_RIPE-NCC-HM-MNT_<177>1592696256 [1:2403374:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 38 [Classification: Misc Attack] [Priority: 2]:  {TCP} 51.161.12.231:32767
2020-06-21 08:06:17
110.74.196.152 attack
(sshd) Failed SSH login from 110.74.196.152 (KH/Cambodia/ezecom.110.74.196.152.ezecom.com.kh): 5 in the last 3600 secs
2020-06-21 08:29:58
92.222.92.114 attack
Jun 21 00:03:14 rush sshd[22751]: Failed password for root from 92.222.92.114 port 59456 ssh2
Jun 21 00:06:28 rush sshd[22912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.92.114
Jun 21 00:06:31 rush sshd[22912]: Failed password for invalid user PPSNEPL from 92.222.92.114 port 58946 ssh2
...
2020-06-21 08:15:28
92.63.197.61 attackbots
[MK-VM1] Blocked by UFW
2020-06-21 08:00:32
104.243.19.97 attackspambots
Jun 20 14:07:34 XXX sshd[16292]: Invalid user wj from 104.243.19.97 port 56892
2020-06-21 08:36:01
92.63.197.58 attack
Triggered: repeated knocking on closed ports.
2020-06-21 08:00:57
129.226.174.139 attack
2020-06-21T01:19:32.959575vps751288.ovh.net sshd\[29307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.174.139  user=root
2020-06-21T01:19:34.963286vps751288.ovh.net sshd\[29307\]: Failed password for root from 129.226.174.139 port 60128 ssh2
2020-06-21T01:23:49.696200vps751288.ovh.net sshd\[29352\]: Invalid user fuser from 129.226.174.139 port 48804
2020-06-21T01:23:49.706260vps751288.ovh.net sshd\[29352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.174.139
2020-06-21T01:23:51.323636vps751288.ovh.net sshd\[29352\]: Failed password for invalid user fuser from 129.226.174.139 port 48804 ssh2
2020-06-21 08:35:45
89.248.160.178 attack
NL_IPV_<177>1592696970 [1:2403468:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 85 [Classification: Misc Attack] [Priority: 2]:  {TCP} 89.248.160.178:47459
2020-06-21 08:01:48
54.39.215.32 attackbots
US_OVH_<177>1592694063 [1:2403377:58145] ET CINS Active Threat Intelligence Poor Reputation IP UDP group 39 [Classification: Misc Attack] [Priority: 2]:  {UDP} 54.39.215.32:45863
2020-06-21 08:05:51
137.74.132.175 attack
Jun 21 02:11:08 meumeu sshd[1058755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.132.175  user=root
Jun 21 02:11:10 meumeu sshd[1058755]: Failed password for root from 137.74.132.175 port 41580 ssh2
Jun 21 02:14:10 meumeu sshd[1058908]: Invalid user zwj from 137.74.132.175 port 41152
Jun 21 02:14:10 meumeu sshd[1058908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.132.175 
Jun 21 02:14:10 meumeu sshd[1058908]: Invalid user zwj from 137.74.132.175 port 41152
Jun 21 02:14:13 meumeu sshd[1058908]: Failed password for invalid user zwj from 137.74.132.175 port 41152 ssh2
Jun 21 02:17:10 meumeu sshd[1059002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.132.175  user=root
Jun 21 02:17:12 meumeu sshd[1059002]: Failed password for root from 137.74.132.175 port 40738 ssh2
Jun 21 02:20:20 meumeu sshd[1059215]: Invalid user nvidia from 137.74.132.175 port 40322
...
2020-06-21 08:23:11
106.75.67.48 attackbotsspam
Jun 20 17:33:01 server1 sshd\[28543\]: Invalid user sam from 106.75.67.48
Jun 20 17:33:01 server1 sshd\[28543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.67.48 
Jun 20 17:33:03 server1 sshd\[28543\]: Failed password for invalid user sam from 106.75.67.48 port 40393 ssh2
Jun 20 17:39:20 server1 sshd\[487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.67.48  user=root
Jun 20 17:39:22 server1 sshd\[487\]: Failed password for root from 106.75.67.48 port 43525 ssh2
...
2020-06-21 08:13:16

Recently Reported IPs

181.192.19.50 138.219.109.95 115.212.221.89 87.117.58.212
60.185.213.183 201.123.23.57 210.19.254.6 113.161.234.120
191.242.245.131 59.52.177.117 162.142.125.108 209.85.219.49
187.167.217.145 14.231.47.226 189.207.25.148 103.25.171.108
115.218.115.151 189.207.109.136 45.132.185.155 45.248.195.143