Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.245.54.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2033
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.245.54.13.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:52:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
13.54.245.129.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.54.245.129.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
102.41.152.146 attack
Invalid user test1 from 102.41.152.146 port 1843
2020-09-05 01:42:30
161.35.84.204 attackbots
Port scan denied
2020-09-05 02:05:02
171.35.177.228 attackspam
Attempted connection to port 1433.
2020-09-05 02:01:38
106.13.167.3 attack
(sshd) Failed SSH login from 106.13.167.3 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 18:11:54 server sshd[28401]: Invalid user al from 106.13.167.3
Sep  4 18:11:54 server sshd[28401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3 
Sep  4 18:11:57 server sshd[28401]: Failed password for invalid user al from 106.13.167.3 port 40288 ssh2
Sep  4 18:13:59 server sshd[28882]: Invalid user ec2-user from 106.13.167.3
Sep  4 18:13:59 server sshd[28882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3
2020-09-05 01:42:16
188.18.226.216 attackspambots
Unauthorized connection attempt from IP address 188.18.226.216 on Port 445(SMB)
2020-09-05 02:12:46
182.150.44.41 attack
Invalid user test from 182.150.44.41 port 34230
2020-09-05 01:41:09
190.72.201.235 attack
Attempted connection to port 445.
2020-09-05 01:59:34
118.27.9.23 attackbots
2020-09-04T17:16:55.226709+02:00  sshd[17758]: Failed password for root from 118.27.9.23 port 32848 ssh2
2020-09-05 01:58:14
183.60.83.19 botsattack
malware
2020-09-05 01:52:44
128.199.105.58 attackspam
Port scan denied
2020-09-05 02:08:10
128.199.106.46 attackbots
SSH Scan
2020-09-05 02:07:43
186.18.41.1 attackbots
SSH invalid-user multiple login attempts
2020-09-05 01:40:12
37.129.30.173 attackspambots
Unauthorized connection attempt from IP address 37.129.30.173 on Port 445(SMB)
2020-09-05 01:54:26
207.154.215.3 attackbots
Sep  4 08:15:46 mail sshd\[40516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.3  user=root
...
2020-09-05 02:12:16
69.26.135.176 attack
trying to access non-authorized port
2020-09-05 01:44:04

Recently Reported IPs

35.122.66.18 172.165.199.195 26.191.178.166 107.47.235.18
90.196.212.175 215.5.239.221 78.222.218.132 255.65.235.121
150.10.46.17 6.87.107.244 55.244.124.245 160.132.167.86
53.64.74.147 127.44.254.245 218.179.31.46 48.90.77.29
125.6.34.52 101.2.133.163 45.23.1.86 209.139.118.84