Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.119.225.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.119.225.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:25:28 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 82.225.119.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.225.119.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.102.49.114 attackbotsspam
firewall-block, port(s): 3500/tcp
2020-08-27 00:36:41
45.129.33.154 attackspambots
firewall-block, port(s): 53407/tcp, 53443/tcp, 53477/tcp, 53513/tcp, 53546/tcp
2020-08-27 00:23:06
192.241.226.87 attackspam
Unauthorized connection attempt from IP address 192.241.226.87 on Port 3306(MYSQL)
2020-08-27 00:54:37
198.199.100.4 attackspam
scans once in preceeding hours on the ports (in chronological order) 11907 resulting in total of 1 scans from 198.199.64.0/18 block.
2020-08-27 00:47:26
89.248.174.193 attack
firewall-block, port(s): 9600/tcp
2020-08-27 00:37:26
195.54.161.58 attackbots
scans 32 times in preceeding hours on the ports (in chronological order) 8688 8208 8033 8649 8018 50001 8796 8087 8814 49155 8092 8304 8986 3880 2222 5718 65000 8244 8486 17877 8673 8435 8970 64680 1072 1036 8652 2034 8563 8615 2020 8871 resulting in total of 78 scans from 195.54.160.0/23 block.
2020-08-27 00:33:10
43.244.185.171 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 55555 55555
2020-08-27 00:27:22
192.241.227.144 attackbots
scans once in preceeding hours on the ports (in chronological order) 3128 resulting in total of 38 scans from 192.241.128.0/17 block.
2020-08-27 00:52:04
51.91.247.125 attackspambots
scans 3 times in preceeding hours on the ports (in chronological order) 9051 9051 9151 resulting in total of 3 scans from 51.91.247.0/24 block.
2020-08-27 00:21:09
80.82.70.118 attackbots
 TCP (SYN) 80.82.70.118:60000 -> port 139, len 40
2020-08-27 00:43:26
195.54.160.155 attack
 TCP (SYN) 195.54.160.155:57125 -> port 15980, len 44
2020-08-27 00:34:03
195.54.167.94 attackspambots
Port Scan
...
2020-08-27 00:29:09
112.111.232.48 attackbotsspam
(ftpd) Failed FTP login from 112.111.232.48 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 26 19:12:10 ir1 pure-ftpd: (?@112.111.232.48) [WARNING] Authentication failed for user [anonymous]
2020-08-27 00:34:36
54.39.49.42 attackspambots
scans 2 times in preceeding hours on the ports (in chronological order) 5063 5064
2020-08-27 00:20:09
89.248.167.131 attackspambots
Unauthorized connection attempt
IP: 89.248.167.131
Ports affected
    Message Submission (587) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS202425 IP Volume inc
   Netherlands (NL)
   CIDR 89.248.160.0/21
Log Date: 26/08/2020 3:54:00 PM UTC
2020-08-27 00:38:52

Recently Reported IPs

184.39.31.165 53.140.10.173 233.117.61.230 147.42.63.244
130.1.52.148 21.9.153.71 25.67.214.188 56.187.237.97
18.153.14.51 191.21.89.141 56.170.130.203 34.242.234.117
3.53.135.162 234.7.120.13 65.240.224.135 39.129.119.213
230.157.209.96 190.169.167.192 80.50.55.103 96.241.216.77