Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.229.148.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.229.148.134.			IN	A

;; AUTHORITY SECTION:
.			385	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:54:35 CST 2022
;; MSG SIZE  rcvd: 107
Host info
134.148.229.13.in-addr.arpa domain name pointer ec2-13-229-148-134.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.148.229.13.in-addr.arpa	name = ec2-13-229-148-134.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.50.8 attackspambots
Invalid user test2 from 162.243.50.8 port 51891
2019-11-01 02:29:00
45.136.109.207 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 02:15:26
180.106.242.254 attackbotsspam
Automatic report - Port Scan Attack
2019-11-01 02:29:43
36.67.135.42 attack
Oct 31 14:26:18 legacy sshd[16450]: Failed password for nobody from 36.67.135.42 port 60080 ssh2
Oct 31 14:31:30 legacy sshd[16610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.135.42
Oct 31 14:31:32 legacy sshd[16610]: Failed password for invalid user melquior from 36.67.135.42 port 51675 ssh2
...
2019-11-01 02:13:01
192.99.151.33 attackspam
$f2bV_matches
2019-11-01 02:28:06
222.186.175.169 attackbots
SSH Brute Force, server-1 sshd[21285]: Failed password for root from 222.186.175.169 port 5564 ssh2
2019-11-01 02:04:49
210.56.21.230 attackspambots
Unauthorized connection attempt from IP address 210.56.21.230 on Port 445(SMB)
2019-11-01 02:10:37
195.246.52.114 attackspambots
Unauthorized connection attempt from IP address 195.246.52.114 on Port 445(SMB)
2019-11-01 01:57:59
202.179.70.84 attack
Unauthorized connection attempt from IP address 202.179.70.84 on Port 445(SMB)
2019-11-01 02:13:27
1.22.119.34 attack
Unauthorized connection attempt from IP address 1.22.119.34 on Port 445(SMB)
2019-11-01 02:07:55
209.59.188.116 attackspambots
Oct 31 18:49:15 icinga sshd[15628]: Failed password for root from 209.59.188.116 port 46718 ssh2
...
2019-11-01 02:30:29
45.136.110.49 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 02:29:17
202.83.27.171 attack
Unauthorized connection attempt from IP address 202.83.27.171 on Port 445(SMB)
2019-11-01 02:18:50
187.111.23.14 attack
Oct 31 05:38:51 eddieflores sshd\[14863\]: Invalid user qwerty from 187.111.23.14
Oct 31 05:38:51 eddieflores sshd\[14863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-111-23-14.mundivox.com
Oct 31 05:38:53 eddieflores sshd\[14863\]: Failed password for invalid user qwerty from 187.111.23.14 port 45028 ssh2
Oct 31 05:43:52 eddieflores sshd\[15320\]: Invalid user februari from 187.111.23.14
Oct 31 05:43:52 eddieflores sshd\[15320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-111-23-14.mundivox.com
2019-11-01 02:05:19
219.83.162.23 attackspambots
Oct 31 17:34:18 ns381471 sshd[9507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.83.162.23
Oct 31 17:34:20 ns381471 sshd[9507]: Failed password for invalid user zabbix from 219.83.162.23 port 33952 ssh2
2019-11-01 01:57:24

Recently Reported IPs

13.229.146.72 13.229.148.156 13.229.148.176 13.229.148.164
13.229.148.255 13.229.148.22 13.229.148.230 13.229.148.44
13.229.148.16 13.229.148.76 13.229.148.86 13.229.149.112
13.229.150.130 13.229.150.165 13.229.149.255 13.229.150.230
13.229.150.227 13.229.150.141 13.229.150.75 13.229.150.161