Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Osaka

Region: Ōsaka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: Jupiter Telecommunications Co., Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.46.16.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9803
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.46.16.45.			IN	A

;; AUTHORITY SECTION:
.			2940	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060901 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 03:27:22 CST 2019
;; MSG SIZE  rcvd: 115

Host info
45.16.46.61.in-addr.arpa domain name pointer zaq3d2e102d.zaq.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
45.16.46.61.in-addr.arpa	name = zaq3d2e102d.zaq.ne.jp.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
208.86.161.102 attackbotsspam
Sep 27 17:38:38 firewall sshd[18332]: Invalid user admin from 208.86.161.102
Sep 27 17:38:41 firewall sshd[18332]: Failed password for invalid user admin from 208.86.161.102 port 42240 ssh2
Sep 27 17:38:47 firewall sshd[18339]: Invalid user admin from 208.86.161.102
...
2020-09-29 05:44:03
106.52.20.112 attackbotsspam
SSH Invalid Login
2020-09-29 05:46:15
104.248.147.20 attack
Sep 28 17:18:16 server sshd[19603]: Failed password for invalid user new from 104.248.147.20 port 49194 ssh2
Sep 28 17:20:40 server sshd[20916]: Failed password for invalid user laravel from 104.248.147.20 port 50160 ssh2
Sep 28 17:22:43 server sshd[21989]: Failed password for invalid user mauro from 104.248.147.20 port 50066 ssh2
2020-09-29 05:38:14
47.176.38.253 attackspam
leo_www
2020-09-29 05:36:35
51.75.24.200 attackbotsspam
Invalid user admin from 51.75.24.200 port 55476
2020-09-29 05:40:56
106.52.205.211 attack
SSH Invalid Login
2020-09-29 05:48:50
116.196.94.108 attack
$f2bV_matches
2020-09-29 05:33:12
50.192.43.149 attack
Automatic report - Banned IP Access
2020-09-29 05:19:00
142.93.213.91 attackbotsspam
142.93.213.91 - - [28/Sep/2020:23:30:04 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.213.91 - - [28/Sep/2020:23:30:06 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.213.91 - - [28/Sep/2020:23:30:08 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-29 05:47:35
148.70.33.136 attackspambots
Sep 28 23:14:42 vps333114 sshd[3071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.33.136
Sep 28 23:14:44 vps333114 sshd[3071]: Failed password for invalid user sysadmin from 148.70.33.136 port 43158 ssh2
...
2020-09-29 05:30:34
212.56.152.151 attackbots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-29 05:26:12
180.76.103.247 attackspam
Sep 28 23:11:23 lavrea sshd[48564]: Invalid user weblogic from 180.76.103.247 port 43052
...
2020-09-29 05:13:12
162.243.237.90 attackspambots
Invalid user cssserver from 162.243.237.90 port 41265
2020-09-29 05:44:16
222.186.175.150 attackbotsspam
Failed password for invalid user from 222.186.175.150 port 61298 ssh2
2020-09-29 05:16:44
207.154.242.83 attackbots
/GponForm/diag_Form%3Fstyle/
2020-09-29 05:16:02

Recently Reported IPs

32.228.188.156 173.134.23.40 190.157.117.91 81.16.8.104
192.66.111.35 72.166.12.179 14.163.241.240 197.40.118.252
198.47.173.33 147.213.115.10 190.85.113.83 206.1.76.64
221.63.6.247 24.135.239.252 108.18.120.34 156.91.200.189
51.211.171.227 63.239.220.79 4.222.161.60 201.97.57.122