Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.221.45.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.221.45.239.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 14:34:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
239.45.221.13.in-addr.arpa domain name pointer ec2-13-221-45-239.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.45.221.13.in-addr.arpa	name = ec2-13-221-45-239.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.39.2.219 attack
May  5 06:26:15 pkdns2 sshd\[23280\]: Invalid user berry from 120.39.2.219May  5 06:26:16 pkdns2 sshd\[23280\]: Failed password for invalid user berry from 120.39.2.219 port 40164 ssh2May  5 06:30:58 pkdns2 sshd\[23630\]: Invalid user clemens from 120.39.2.219May  5 06:31:00 pkdns2 sshd\[23630\]: Failed password for invalid user clemens from 120.39.2.219 port 45792 ssh2May  5 06:35:43 pkdns2 sshd\[23900\]: Invalid user rg from 120.39.2.219May  5 06:35:46 pkdns2 sshd\[23900\]: Failed password for invalid user rg from 120.39.2.219 port 51414 ssh2
...
2020-05-05 13:45:37
223.83.216.125 attackspambots
"fail2ban match"
2020-05-05 13:28:46
185.173.35.37 attackbots
...
2020-05-05 13:44:38
119.5.157.124 attack
Brute-force attempt banned
2020-05-05 13:08:55
123.206.216.65 attack
$f2bV_matches
2020-05-05 13:45:25
89.248.167.131 attackbotsspam
srv02 Mass scanning activity detected Target: 6697(ircs-u) ..
2020-05-05 13:14:44
45.55.173.225 attackbots
May  5 06:57:43 vmd48417 sshd[13756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.173.225
2020-05-05 13:09:09
124.195.199.173 attackspambots
1588640911 - 05/05/2020 03:08:31 Host: 124.195.199.173/124.195.199.173 Port: 445 TCP Blocked
2020-05-05 13:45:10
103.25.21.34 attackbotsspam
Observed on multiple hosts.
2020-05-05 13:21:57
58.248.0.197 attack
May  5 03:39:04 [host] sshd[5616]: Invalid user in
May  5 03:39:04 [host] sshd[5616]: pam_unix(sshd:a
May  5 03:39:06 [host] sshd[5616]: Failed password
2020-05-05 13:27:17
185.165.168.229 attackspam
CMS (WordPress or Joomla) login attempt.
2020-05-05 13:17:03
178.128.248.121 attack
May  5 04:02:18 buvik sshd[17653]: Invalid user firewall from 178.128.248.121
May  5 04:02:18 buvik sshd[17653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.248.121
May  5 04:02:21 buvik sshd[17653]: Failed password for invalid user firewall from 178.128.248.121 port 32930 ssh2
...
2020-05-05 13:31:44
140.249.24.175 attackbots
May  5 05:10:01 home sshd[28922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.24.175
May  5 05:10:03 home sshd[28922]: Failed password for invalid user karine from 140.249.24.175 port 40425 ssh2
May  5 05:15:07 home sshd[29681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.24.175
...
2020-05-05 13:34:57
46.38.144.32 attackspam
Rude login attack (219 tries in 1d)
2020-05-05 13:10:46
58.246.173.94 attack
Fail2Ban Ban Triggered (2)
2020-05-05 13:34:02

Recently Reported IPs

142.97.79.158 130.4.210.148 254.150.42.73 25.240.181.26
98.72.76.170 67.50.76.242 75.244.105.84 12.136.47.29
132.74.245.56 58.140.78.16 5.8.112.164 231.24.195.20
119.96.205.177 230.25.174.22 88.64.121.208 115.203.156.83
170.211.23.41 129.116.171.38 28.98.108.76 49.1.208.230