Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Songpa-gu

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.254.9.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.254.9.13.			IN	A

;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123101 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 01 11:48:53 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 13.9.254.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.9.254.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.240.144.41 attack
Unauthorized connection attempt from IP address 191.240.144.41 on Port 445(SMB)
2020-07-06 04:56:43
192.241.221.177 attack
[Tue Jun 30 03:01:27 2020] - DDoS Attack From IP: 192.241.221.177 Port: 38804
2020-07-06 05:14:55
218.92.0.221 attackspambots
failed root login
2020-07-06 04:39:17
51.77.147.5 attackspambots
3x Failed Password
2020-07-06 04:56:16
163.172.61.214 attackspambots
bruteforce detected
2020-07-06 05:05:01
138.122.148.204 attackspambots
VNC brute force attack detected by fail2ban
2020-07-06 04:46:23
101.99.15.76 attackspam
Unauthorized connection attempt from IP address 101.99.15.76 on Port 445(SMB)
2020-07-06 05:06:48
124.156.245.159 attack
[Wed Jul 01 10:09:48 2020] - DDoS Attack From IP: 124.156.245.159 Port: 44086
2020-07-06 04:50:16
64.222.107.204 attack
Telnet Honeypot -> Telnet Bruteforce / Login
2020-07-06 04:45:23
201.163.114.170 attackspambots
Unauthorized connection attempt from IP address 201.163.114.170 on Port 445(SMB)
2020-07-06 05:08:14
150.109.180.126 attackspam
[Wed Jul 01 11:41:46 2020] - DDoS Attack From IP: 150.109.180.126 Port: 44800
2020-07-06 04:45:53
93.125.114.95 attack
Jul  5 14:35:21 server1 sshd\[27984\]: Failed password for invalid user op from 93.125.114.95 port 38996 ssh2
Jul  5 14:39:23 server1 sshd\[29239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.95  user=root
Jul  5 14:39:25 server1 sshd\[29239\]: Failed password for root from 93.125.114.95 port 39756 ssh2
Jul  5 14:43:21 server1 sshd\[30431\]: Invalid user ss from 93.125.114.95
Jul  5 14:43:21 server1 sshd\[30431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.95 
...
2020-07-06 04:47:40
94.74.148.120 attack
Jul  5 13:34:53 mailman postfix/smtpd[12455]: warning: unknown[94.74.148.120]: SASL PLAIN authentication failed: authentication failure
2020-07-06 04:46:39
104.155.215.32 attackbots
Jul  5 20:39:36 ns382633 sshd\[27459\]: Invalid user untu from 104.155.215.32 port 43580
Jul  5 20:39:36 ns382633 sshd\[27459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.155.215.32
Jul  5 20:39:37 ns382633 sshd\[27459\]: Failed password for invalid user untu from 104.155.215.32 port 43580 ssh2
Jul  5 20:43:56 ns382633 sshd\[28173\]: Invalid user shop from 104.155.215.32 port 40102
Jul  5 20:43:56 ns382633 sshd\[28173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.155.215.32
2020-07-06 05:09:11
165.22.253.190 attackspam
Jul  5 19:52:59 ip-172-31-62-245 sshd\[24235\]: Invalid user sjd from 165.22.253.190\
Jul  5 19:53:01 ip-172-31-62-245 sshd\[24235\]: Failed password for invalid user sjd from 165.22.253.190 port 40489 ssh2\
Jul  5 19:56:18 ip-172-31-62-245 sshd\[24302\]: Invalid user abhay from 165.22.253.190\
Jul  5 19:56:21 ip-172-31-62-245 sshd\[24302\]: Failed password for invalid user abhay from 165.22.253.190 port 35526 ssh2\
Jul  5 19:59:43 ip-172-31-62-245 sshd\[24339\]: Invalid user www from 165.22.253.190\
2020-07-06 04:55:20

Recently Reported IPs

127.109.18.10 31.236.114.58 92.234.181.154 21.57.197.57
137.136.141.120 83.251.52.57 149.177.188.236 47.166.203.58
103.21.253.249 10.72.236.17 153.94.161.251 234.242.139.54
8.121.78.72 63.144.209.79 43.189.45.230 253.176.24.93
114.151.199.165 197.234.242.98 210.92.18.185 174.250.14.39