Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.212.99.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.212.99.8.			IN	A

;; AUTHORITY SECTION:
.			379	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:52:59 CST 2022
;; MSG SIZE  rcvd: 104
Host info
8.99.212.13.in-addr.arpa domain name pointer ec2-13-212-99-8.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.99.212.13.in-addr.arpa	name = ec2-13-212-99-8.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.70.253.202 attack
Jun  8 15:53:02 ns381471 sshd[20535]: Failed password for root from 182.70.253.202 port 39431 ssh2
2020-06-08 22:18:41
222.112.220.12 attackbotsspam
SSH Brute-Forcing (server2)
2020-06-08 22:16:40
87.138.254.133 attack
Jun  8 14:03:45 jane sshd[2773]: Failed password for root from 87.138.254.133 port 49944 ssh2
...
2020-06-08 22:05:20
202.95.129.202 attack
prod6
...
2020-06-08 22:14:04
118.25.74.199 attackspam
Jun  8 13:58:48 inter-technics sshd[14461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.74.199  user=root
Jun  8 13:58:51 inter-technics sshd[14461]: Failed password for root from 118.25.74.199 port 53394 ssh2
Jun  8 14:03:30 inter-technics sshd[14709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.74.199  user=root
Jun  8 14:03:32 inter-technics sshd[14709]: Failed password for root from 118.25.74.199 port 47902 ssh2
Jun  8 14:08:16 inter-technics sshd[15074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.74.199  user=root
Jun  8 14:08:18 inter-technics sshd[15074]: Failed password for root from 118.25.74.199 port 42416 ssh2
...
2020-06-08 21:45:22
185.100.87.41 attack
prod6
...
2020-06-08 22:00:54
47.42.167.100 attackspam
Jun  8 13:04:17 sigma sshd\[23505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-042-167-100.res.spectrum.com  user=rootJun  8 13:08:08 sigma sshd\[23558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-042-167-100.res.spectrum.com  user=root
...
2020-06-08 22:00:30
122.114.120.213 attackbots
Jun  8 15:07:52 abendstille sshd\[17147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.120.213  user=root
Jun  8 15:07:54 abendstille sshd\[17147\]: Failed password for root from 122.114.120.213 port 34828 ssh2
Jun  8 15:11:40 abendstille sshd\[20826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.120.213  user=root
Jun  8 15:11:42 abendstille sshd\[20826\]: Failed password for root from 122.114.120.213 port 49238 ssh2
Jun  8 15:15:41 abendstille sshd\[24785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.120.213  user=root
...
2020-06-08 22:24:34
94.231.14.84 attack
Unauthorized connection attempt detected from IP address 94.231.14.84 to port 9530
2020-06-08 22:11:13
195.54.160.212 attack
scans 14 times in preceeding hours on the ports (in chronological order) 44436 44437 44426 44435 44436 44432 44433 44438 44429 44431 25321 25222 25333 25999
2020-06-08 22:25:32
41.111.133.103 attackspam
2020-06-08T08:12:20.692335devel sshd[3974]: Failed password for root from 41.111.133.103 port 4558 ssh2
2020-06-08T08:15:48.534473devel sshd[4247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.133.103  user=root
2020-06-08T08:15:50.480855devel sshd[4247]: Failed password for root from 41.111.133.103 port 17720 ssh2
2020-06-08 22:12:34
211.57.153.250 attackspambots
Jun  8 14:06:45 sso sshd[1007]: Failed password for root from 211.57.153.250 port 40345 ssh2
...
2020-06-08 21:44:17
213.87.101.176 attack
2020-06-08T13:57:29.735511  sshd[30000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.101.176  user=root
2020-06-08T13:57:31.806388  sshd[30000]: Failed password for root from 213.87.101.176 port 36366 ssh2
2020-06-08T14:07:36.784727  sshd[30291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.101.176  user=root
2020-06-08T14:07:38.519340  sshd[30291]: Failed password for root from 213.87.101.176 port 36962 ssh2
...
2020-06-08 22:20:42
140.143.245.30 attackspambots
Jun  8 15:49:28 eventyay sshd[8134]: Failed password for root from 140.143.245.30 port 47012 ssh2
Jun  8 15:54:06 eventyay sshd[8287]: Failed password for root from 140.143.245.30 port 43710 ssh2
...
2020-06-08 22:19:25
183.63.72.242 attack
Jun  8 14:04:20 vmi345603 sshd[24189]: Failed password for root from 183.63.72.242 port 53734 ssh2
...
2020-06-08 22:18:07

Recently Reported IPs

13.212.99.28 13.212.99.74 13.212.99.42 13.212.99.80
13.213.0.53 13.213.0.226 13.213.0.206 13.212.99.37
13.213.139.74 13.213.0.91 13.213.11.29 13.213.2.131
13.213.213.26 13.213.229.53 13.213.2.99 13.213.29.181
13.213.248.120 13.213.225.204 13.213.42.197 13.213.43.134