Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.61.254.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.61.254.12.			IN	A

;; AUTHORITY SECTION:
.			284	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:22:52 CST 2023
;; MSG SIZE  rcvd: 105
Host info
12.254.61.61.in-addr.arpa domain name pointer dnsbgp2.itri.org.tw.
12.254.61.61.in-addr.arpa domain name pointer dns.itri.org.tw.
12.254.61.61.in-addr.arpa domain name pointer dnss.itri.org.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.254.61.61.in-addr.arpa	name = dnsbgp2.itri.org.tw.
12.254.61.61.in-addr.arpa	name = dns.itri.org.tw.
12.254.61.61.in-addr.arpa	name = dnss.itri.org.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.252.141.83 attackspambots
Feb  7 14:19:18 web9 sshd\[14483\]: Invalid user ymq from 61.252.141.83
Feb  7 14:19:18 web9 sshd\[14483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.252.141.83
Feb  7 14:19:20 web9 sshd\[14483\]: Failed password for invalid user ymq from 61.252.141.83 port 21573 ssh2
Feb  7 14:22:30 web9 sshd\[14904\]: Invalid user fkp from 61.252.141.83
Feb  7 14:22:30 web9 sshd\[14904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.252.141.83
2020-02-08 10:45:16
27.72.130.150 attackbots
22/tcp 8291/tcp
[2020-02-07]2pkt
2020-02-08 10:42:58
211.20.146.223 attack
23/tcp
[2020-02-07]1pkt
2020-02-08 10:11:45
203.57.58.74 attackbotsspam
6379/tcp
[2020-02-07]1pkt
2020-02-08 10:10:36
109.87.115.220 attackbots
Feb  8 01:10:57 legacy sshd[31322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.87.115.220
Feb  8 01:10:59 legacy sshd[31322]: Failed password for invalid user acb from 109.87.115.220 port 37259 ssh2
Feb  8 01:14:18 legacy sshd[31473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.87.115.220
...
2020-02-08 10:35:32
202.175.46.170 attackspam
Feb  7 21:09:18 plusreed sshd[15970]: Invalid user atb from 202.175.46.170
...
2020-02-08 10:18:51
39.59.31.153 attack
Email rejected due to spam filtering
2020-02-08 10:42:36
190.78.5.181 attack
445/tcp
[2020-02-07]1pkt
2020-02-08 10:25:23
36.189.255.162 attackspam
Feb  8 00:44:20 cvbnet sshd[30580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.255.162 
Feb  8 00:44:22 cvbnet sshd[30580]: Failed password for invalid user rqx from 36.189.255.162 port 41101 ssh2
...
2020-02-08 10:38:40
188.26.125.126 attackspambots
Automatic report - Banned IP Access
2020-02-08 10:37:32
202.148.17.82 attackbotsspam
445/tcp
[2020-02-07]1pkt
2020-02-08 10:17:45
222.186.30.209 attackspam
2020-2-8 3:17:22 AM: failed ssh attempt
2020-02-08 10:22:11
62.199.108.54 attack
5555/tcp
[2020-02-07]1pkt
2020-02-08 10:31:55
46.39.178.146 attack
Automatic report - SSH Brute-Force Attack
2020-02-08 10:43:27
61.224.65.209 attackspam
23/tcp
[2020-02-07]1pkt
2020-02-08 10:15:44

Recently Reported IPs

46.101.225.42 140.116.91.151 61.61.247.49 140.116.7.212
194.66.35.42 140.116.157.29 10.7.60.225 140.116.64.175
202.29.145.49 140.116.131.101 140.116.194.108 131.159.66.70
14.139.125.192 10.3.202.92 140.116.123.65 184.171.92.30
140.116.84.95 195.246.54.228 219.192.23.46 200.145.46.133