Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.45.30.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.45.30.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120602 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 10:58:27 CST 2024
;; MSG SIZE  rcvd: 104
Host info
81.30.45.61.in-addr.arpa domain name pointer g81.61-45-30.ppp.wakwak.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.30.45.61.in-addr.arpa	name = g81.61-45-30.ppp.wakwak.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.70.97.233 attackspambots
$f2bV_matches
2020-04-20 20:30:04
103.21.143.161 attackbotsspam
Invalid user postgres from 103.21.143.161 port 53706
2020-04-20 20:01:52
177.67.240.217 attackbots
Invalid user test from 177.67.240.217 port 53714
2020-04-20 20:00:20
203.63.75.248 attack
Invalid user ubuntu2 from 203.63.75.248 port 38564
2020-04-20 20:09:00
137.74.171.160 attack
Invalid user hn from 137.74.171.160 port 45892
2020-04-20 20:22:30
209.121.162.20 attack
Invalid user hr from 209.121.162.20 port 36970
2020-04-20 20:07:13
189.130.5.51 attack
WordPress wp-login brute force :: 189.130.5.51 0.136 BYPASS [20/Apr/2020:04:47:52  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2254 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36"
2020-04-20 19:57:30
95.111.74.98 attackspambots
Apr 20 01:40:23 php1 sshd\[15164\]: Invalid user postgres from 95.111.74.98
Apr 20 01:40:23 php1 sshd\[15164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
Apr 20 01:40:26 php1 sshd\[15164\]: Failed password for invalid user postgres from 95.111.74.98 port 41906 ssh2
Apr 20 01:44:41 php1 sshd\[15578\]: Invalid user ftpuser1 from 95.111.74.98
Apr 20 01:44:41 php1 sshd\[15578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
2020-04-20 19:51:49
152.67.55.22 attackspam
Invalid user uftp from 152.67.55.22 port 40969
2020-04-20 20:19:18
189.112.12.107 attackspambots
Invalid user admin from 189.112.12.107 port 57538
2020-04-20 20:11:16
121.229.20.121 attackspam
Invalid user ftpuser from 121.229.20.121 port 57066
2020-04-20 20:29:01
119.97.164.244 attackspam
Invalid user admin from 119.97.164.244 port 50246
2020-04-20 20:30:28
146.196.96.125 attackspam
Invalid user mine from 146.196.96.125 port 64264
2020-04-20 20:20:59
161.35.106.37 attack
scan r
2020-04-20 19:58:51
202.158.62.240 attackspambots
Invalid user test from 202.158.62.240 port 52037
2020-04-20 20:09:17

Recently Reported IPs

121.158.54.99 41.53.26.195 166.137.50.165 144.224.63.41
75.60.31.145 200.57.34.214 33.244.31.55 207.155.193.250
221.94.103.43 39.13.89.173 243.105.99.30 93.113.9.220
144.43.190.94 139.95.176.27 176.253.131.173 170.185.17.147
16.223.90.23 58.84.207.46 89.158.160.68 128.231.56.90