Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.229.70.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.229.70.244.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:56:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
244.70.229.13.in-addr.arpa domain name pointer ec2-13-229-70-244.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.70.229.13.in-addr.arpa	name = ec2-13-229-70-244.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.155.218 attack
Invalid user zxx from 128.199.155.218 port 28123
2020-07-12 21:23:55
141.98.81.210 attack
Jul 12 13:08:32 marvibiene sshd[11689]: Invalid user admin from 141.98.81.210 port 10407
Jul 12 13:08:32 marvibiene sshd[11689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.210
Jul 12 13:08:32 marvibiene sshd[11689]: Invalid user admin from 141.98.81.210 port 10407
Jul 12 13:08:34 marvibiene sshd[11689]: Failed password for invalid user admin from 141.98.81.210 port 10407 ssh2
...
2020-07-12 21:15:42
210.12.27.226 attack
Invalid user hal from 210.12.27.226 port 50548
2020-07-12 21:02:09
144.172.73.36 attackspam
$f2bV_matches
2020-07-12 21:14:26
62.234.67.178 attackbots
Invalid user sandy from 62.234.67.178 port 38720
2020-07-12 21:38:41
138.197.186.199 attack
Jul 12 14:46:14 abendstille sshd\[12563\]: Invalid user save from 138.197.186.199
Jul 12 14:46:14 abendstille sshd\[12563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.186.199
Jul 12 14:46:15 abendstille sshd\[12563\]: Failed password for invalid user save from 138.197.186.199 port 58458 ssh2
Jul 12 14:51:31 abendstille sshd\[17886\]: Invalid user arika from 138.197.186.199
Jul 12 14:51:31 abendstille sshd\[17886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.186.199
...
2020-07-12 21:20:37
111.11.181.53 attack
Invalid user xa from 111.11.181.53 port 14889
2020-07-12 21:31:33
190.0.159.86 attackspambots
Invalid user ilayana from 190.0.159.86 port 49121
2020-07-12 21:04:55
100.0.197.18 attackspambots
Invalid user qinjitao from 100.0.197.18 port 40788
2020-07-12 21:34:55
118.89.69.159 attackbotsspam
Invalid user nuru from 118.89.69.159 port 32850
2020-07-12 21:28:21
212.129.38.177 attackbots
Invalid user test from 212.129.38.177 port 32896
2020-07-12 21:01:24
123.207.241.226 attackbotsspam
Invalid user baby from 123.207.241.226 port 34422
2020-07-12 21:24:40
185.101.107.199 attackspambots
Brute-Force reported by Fail2Ban
2020-07-12 21:06:36
87.251.74.30 attackspambots
"fail2ban match"
2020-07-12 21:36:14
62.234.153.213 attack
Invalid user test from 62.234.153.213 port 43614
2020-07-12 21:38:22

Recently Reported IPs

13.229.65.166 13.229.70.192 6.250.54.75 13.229.69.222
13.229.72.76 13.229.71.61 13.229.73.135 13.229.74.133
13.229.73.138 13.229.73.144 13.229.74.216 13.229.72.52
13.229.73.17 13.229.74.225 13.229.74.203 13.229.74.96
13.229.74.32 13.229.74.28 13.229.74.223 13.229.75.147