Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.214.73.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.214.73.139.			IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 02 18:26:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
139.73.214.13.in-addr.arpa domain name pointer ec2-13-214-73-139.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.73.214.13.in-addr.arpa	name = ec2-13-214-73-139.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.234.134.42 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 01:49:00
68.183.126.149 attackbots
2020-03-02T12:26:43.336Z CLOSE host=68.183.126.149 port=58366 fd=4 time=20.014 bytes=3
...
2020-03-13 02:08:09
62.245.223.110 attack
2020-03-06T09:50:48.570Z CLOSE host=62.245.223.110 port=62474 fd=4 time=20.009 bytes=17
...
2020-03-13 02:24:20
71.6.232.6 attack
03/12/2020-13:45:23.730557 71.6.232.6 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-03-13 02:05:20
31.199.193.162 attack
Invalid user 00 from 31.199.193.162 port 21738
2020-03-13 02:18:23
72.255.41.141 attackbots
2019-12-01T01:48:32.388Z CLOSE host=72.255.41.141 port=15659 fd=4 time=20.017 bytes=21
...
2020-03-13 02:02:59
112.85.42.229 attackspambots
SSH auth scanning - multiple failed logins
2020-03-13 02:16:06
185.21.41.71 attackbots
185.21.41.71 - - [12/Mar/2020:13:52:59 +0100] "GET /wp-login.php HTTP/1.1" 200 5347 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.21.41.71 - - [12/Mar/2020:13:53:00 +0100] "POST /wp-login.php HTTP/1.1" 200 6246 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.21.41.71 - - [12/Mar/2020:13:53:01 +0100] "POST /xmlrpc.php HTTP/1.1" 200 438 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-13 01:53:30
77.141.175.126 attackbots
2020-02-27T01:27:09.684Z CLOSE host=77.141.175.126 port=41690 fd=4 time=20.010 bytes=27
...
2020-03-13 01:52:15
69.63.71.198 attackspam
2019-11-24T03:06:37.971Z CLOSE host=69.63.71.198 port=56472 fd=4 time=20.001 bytes=23
...
2020-03-13 02:06:35
68.194.22.92 attackspambots
2020-03-05T06:54:40.854Z CLOSE host=68.194.22.92 port=34648 fd=4 time=60.040 bytes=103
...
2020-03-13 02:07:33
199.116.237.125 attackspam
Telnet brute force and port scan
2020-03-13 02:12:23
72.240.7.100 attack
2020-02-14T03:50:33.777Z CLOSE host=72.240.7.100 port=51728 fd=4 time=20.011 bytes=19
...
2020-03-13 02:03:33
66.70.225.220 attackspam
2020-01-24T00:46:14.960Z CLOSE host=66.70.225.220 port=33874 fd=4 time=20.019 bytes=21
...
2020-03-13 02:09:56
178.128.47.75 attack
Wordpress attack
2020-03-13 02:03:54

Recently Reported IPs

151.202.44.186 132.3.42.239 139.225.98.216 200.40.33.99
68.243.24.52 81.9.136.66 176.128.149.209 221.250.141.86
161.243.131.254 209.222.206.205 15.76.151.125 226.74.67.10
167.28.165.20 0.21.1.10 190.175.107.206 70.45.23.6
152.178.126.161 203.101.239.163 17.208.155.111 199.154.211.72