Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.229.109.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.229.109.101.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:53:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
101.109.229.13.in-addr.arpa domain name pointer ec2-13-229-109-101.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
101.109.229.13.in-addr.arpa	name = ec2-13-229-109-101.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.204.211.136 attackbots
Unauthorized connection attempt detected from IP address 148.204.211.136 to port 2220 [J]
2020-02-02 00:13:29
147.0.220.29 attackspam
Dec  6 11:40:52 v22018076590370373 sshd[7383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.0.220.29 
Dec  6 11:40:54 v22018076590370373 sshd[7383]: Failed password for invalid user www from 147.0.220.29 port 49058 ssh2
...
2020-02-02 00:41:11
46.103.52.8 attackspambots
Honeypot attack, port: 4567, PTR: 46-52-8.adsl.cyta.gr.
2020-02-02 00:52:31
188.87.101.119 attack
Unauthorized connection attempt detected from IP address 188.87.101.119 to port 2220 [J]
2020-02-02 00:51:14
183.88.6.54 attackspambots
445/tcp
[2020-02-01]1pkt
2020-02-02 00:46:16
80.82.64.171 attackbotsspam
670/tcp 243/tcp 213/tcp...
[2019-12-24/2020-02-01]269pkt,249pt.(tcp)
2020-02-02 00:09:33
148.235.57.184 attackbotsspam
Unauthorized connection attempt detected from IP address 148.235.57.184 to port 2220 [J]
2020-02-02 00:08:54
49.206.22.221 attackspambots
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-02-02 00:39:53
147.139.162.29 attack
...
2020-02-02 00:22:57
147.78.152.98 attackbots
...
2020-02-02 00:18:00
146.71.79.20 attackbotsspam
...
2020-02-02 00:44:52
60.16.216.55 attackbots
23/tcp 23/tcp
[2020-01-31]2pkt
2020-02-02 00:39:23
147.139.136.237 attackspambots
Unauthorized connection attempt detected from IP address 147.139.136.237 to port 2220 [J]
2020-02-02 00:26:43
151.21.130.203 attackspam
Honeypot attack, port: 5555, PTR: ppp-203-130.21-151.wind.it.
2020-02-02 00:10:00
185.153.196.66 attackspambots
RDPBruteCAu24
2020-02-02 00:53:06

Recently Reported IPs

13.229.109.228 13.229.109.26 13.229.109.62 13.229.110.138
13.229.109.30 13.229.110.142 13.229.110.101 13.229.109.59
13.229.109.133 13.229.110.180 13.229.110.161 13.229.110.196
13.229.110.203 13.229.111.105 13.229.111.140 13.229.110.216
13.229.111.226 13.229.111.237 13.229.111.53 13.229.111.208