Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mumbai

Region: Maharashtra

Country: India

Internet Service Provider: Amazon Data Services India

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
Jul 26 01:50:18 ip106 sshd[27153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.234.148.114 
Jul 26 01:50:20 ip106 sshd[27153]: Failed password for invalid user admin from 13.234.148.114 port 35766 ssh2
...
2020-07-26 07:56:11
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.234.148.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.234.148.114.			IN	A

;; AUTHORITY SECTION:
.			448	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072501 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 26 07:56:08 CST 2020
;; MSG SIZE  rcvd: 118
Host info
114.148.234.13.in-addr.arpa domain name pointer ec2-13-234-148-114.ap-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.148.234.13.in-addr.arpa	name = ec2-13-234-148-114.ap-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
161.35.73.66 attackspambots
prod6
...
2020-09-16 02:17:57
77.48.47.102 attack
Sep 15 15:41:23 sshgateway sshd\[29509\]: Invalid user gei from 77.48.47.102
Sep 15 15:41:23 sshgateway sshd\[29509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=home.chita.cz
Sep 15 15:41:26 sshgateway sshd\[29509\]: Failed password for invalid user gei from 77.48.47.102 port 50122 ssh2
2020-09-16 02:30:17
175.144.198.177 attackspambots
$f2bV_matches
2020-09-16 02:35:21
223.100.167.105 attackspam
Sep 15 16:41:32 nopemail auth.info sshd[23313]: Disconnected from authenticating user root 223.100.167.105 port 47939 [preauth]
...
2020-09-16 02:31:34
185.172.110.208 attackbotsspam
TCP Port Scanning
2020-09-16 02:39:04
216.218.206.67 attack
1600184709 - 09/15/2020 22:45:09 Host: scan-06.shadowserver.org/216.218.206.67 Port: 21 TCP Blocked
...
2020-09-16 02:34:35
61.1.217.120 attackbots
Unauthorised access (Sep 14) SRC=61.1.217.120 LEN=52 TTL=111 ID=18201 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-16 02:10:53
213.238.180.13 attackspambots
Automatic report - Banned IP Access
2020-09-16 02:09:27
147.0.22.179 attackspambots
Sep 15 18:39:37 DAAP sshd[30909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.0.22.179  user=root
Sep 15 18:39:40 DAAP sshd[30909]: Failed password for root from 147.0.22.179 port 57226 ssh2
Sep 15 18:42:42 DAAP sshd[30963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.0.22.179  user=root
Sep 15 18:42:44 DAAP sshd[30963]: Failed password for root from 147.0.22.179 port 58290 ssh2
Sep 15 18:44:07 DAAP sshd[30974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.0.22.179  user=root
Sep 15 18:44:09 DAAP sshd[30974]: Failed password for root from 147.0.22.179 port 43838 ssh2
...
2020-09-16 02:43:13
111.229.85.222 attackbots
vps:pam-generic
2020-09-16 02:41:33
151.24.166.108 attack
TCP Port Scanning
2020-09-16 02:29:23
144.91.68.240 attack
Sep 14 18:43:30 root sshd[26736]: Failed password for root from 144.91.68.240 port 60610 ssh2
Sep 14 18:53:41 root sshd[28264]: Failed password for root from 144.91.68.240 port 55566 ssh2
...
2020-09-16 02:29:52
149.210.215.199 attack
Sep 14 21:50:48 [-] sshd[5895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.210.215.199  user=root
Sep 14 21:50:49 [-] sshd[5895]: Failed password for invalid user root from 149.210.215.199 port 36047 ssh2
Sep 14 21:57:29 [-] sshd[6102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.210.215.199
2020-09-16 02:18:12
181.40.122.2 attackbotsspam
SSH Brute-Forcing (server1)
2020-09-16 02:41:02
185.200.118.73 attackspam
TCP port : 1080
2020-09-16 02:36:45

Recently Reported IPs

51.252.175.36 181.60.105.69 183.224.104.70 78.5.95.239
100.198.156.252 44.238.112.232 49.129.50.228 12.155.252.10
207.61.196.146 222.34.237.10 95.47.143.155 221.21.116.213
79.65.105.151 73.12.43.42 1.38.22.164 114.249.69.36
217.63.247.101 172.245.52.219 174.214.193.171 188.100.153.3