Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ningbo

Region: Zhejiang

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.244.239.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54037
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.244.239.13.			IN	A

;; AUTHORITY SECTION:
.			1972	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082600 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 27 00:58:00 CST 2019
;; MSG SIZE  rcvd: 118
Host info
13.239.244.122.in-addr.arpa has no PTR record
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 13.239.244.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.42.59.206 attackspam
Dec 25 11:19:23 askasleikir sshd[368394]: Failed password for invalid user server from 104.42.59.206 port 36202 ssh2
Dec 25 11:34:16 askasleikir sshd[368861]: Failed password for invalid user webmaster from 104.42.59.206 port 47062 ssh2
Dec 25 11:39:06 askasleikir sshd[369007]: Failed password for invalid user web from 104.42.59.206 port 59314 ssh2
2019-12-26 02:04:05
45.17.47.103 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-26 02:19:07
190.211.92.24 attackspam
1577285528 - 12/25/2019 15:52:08 Host: 190.211.92.24/190.211.92.24 Port: 445 TCP Blocked
2019-12-26 02:31:53
118.233.10.56 attackbots
1577285561 - 12/25/2019 15:52:41 Host: 118.233.10.56/118.233.10.56 Port: 445 TCP Blocked
2019-12-26 02:04:55
14.241.39.126 attack
Unauthorized connection attempt detected from IP address 14.241.39.126 to port 445
2019-12-26 02:07:30
223.166.74.154 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 02:03:49
181.48.155.149 attack
Dec 25 15:52:07 sxvn sshd[860991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.155.149
2019-12-26 02:32:24
197.63.183.149 attackbotsspam
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 02:27:14
209.249.227.3 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 02:20:18
104.199.175.58 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 02:23:26
104.227.139.186 attackbots
Dec 25 18:30:09 51-15-180-239 sshd[30059]: Invalid user lramirez from 104.227.139.186 port 42384
...
2019-12-26 02:17:49
198.108.67.48 attack
W 5701,/var/log/auth.log,-,-
2019-12-26 02:24:18
185.245.96.83 attackbots
Invalid user uucp from 185.245.96.83 port 44530
2019-12-26 02:22:33
168.128.86.35 attackspam
Invalid user yan from 168.128.86.35 port 33924
2019-12-26 02:08:31
103.81.156.10 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 02:39:34

Recently Reported IPs

56.142.187.231 47.67.52.183 96.234.131.210 216.127.176.49
88.81.253.23 14.50.227.66 129.233.97.162 221.198.73.209
212.154.64.154 56.11.59.34 99.50.52.211 188.31.140.24
165.213.36.37 65.92.193.153 94.48.2.2 32.208.30.32
97.40.179.11 197.254.170.142 109.252.211.134 55.8.170.125