Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.234.196.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.234.196.148.			IN	A

;; AUTHORITY SECTION:
.			167	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 13:29:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
148.196.234.13.in-addr.arpa domain name pointer ec2-13-234-196-148.ap-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.196.234.13.in-addr.arpa	name = ec2-13-234-196-148.ap-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.234.219.64 attack
Feb  9 14:19:44 h2829583 postfix/smtpd[16119]: lost connection after EHLO from unknown[185.234.219.64]
Feb  9 14:36:48 h2829583 postfix/smtpd[16128]: lost connection after EHLO from unknown[185.234.219.64]
2020-02-09 22:42:16
185.175.93.34 attack
02/09/2020-14:50:29.819936 185.175.93.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-09 23:08:16
218.92.0.212 attackbotsspam
$f2bV_matches
2020-02-09 22:54:42
218.92.0.171 attackspam
2020-02-09T15:41:44.311144wiz-ks3 sshd[4109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2020-02-09T15:41:45.809723wiz-ks3 sshd[4109]: Failed password for root from 218.92.0.171 port 19572 ssh2
2020-02-09T15:41:49.633890wiz-ks3 sshd[4109]: Failed password for root from 218.92.0.171 port 19572 ssh2
2020-02-09T15:41:44.311144wiz-ks3 sshd[4109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2020-02-09T15:41:45.809723wiz-ks3 sshd[4109]: Failed password for root from 218.92.0.171 port 19572 ssh2
2020-02-09T15:41:49.633890wiz-ks3 sshd[4109]: Failed password for root from 218.92.0.171 port 19572 ssh2
2020-02-09T15:41:44.311144wiz-ks3 sshd[4109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2020-02-09T15:41:45.809723wiz-ks3 sshd[4109]: Failed password for root from 218.92.0.171 port 19572 ssh2
2020-02-09T15:41:49.63389
2020-02-09 22:45:50
178.209.88.36 attack
Brute force attempt
2020-02-09 23:22:35
42.118.3.29 attackbotsspam
20/2/9@08:36:20: FAIL: Alarm-Network address from=42.118.3.29
20/2/9@08:36:21: FAIL: Alarm-Network address from=42.118.3.29
...
2020-02-09 23:11:12
185.143.223.173 attackspambots
Brute-force attempt banned
2020-02-09 22:47:18
71.6.233.38 attackspam
19/udp 666/tcp 389/tcp...
[2019-12-18/2020-02-09]7pkt,6pt.(tcp),1pt.(udp)
2020-02-09 22:48:10
185.56.153.236 attackbots
Feb  9 04:38:17 hpm sshd\[21799\]: Invalid user nmq from 185.56.153.236
Feb  9 04:38:17 hpm sshd\[21799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.236
Feb  9 04:38:19 hpm sshd\[21799\]: Failed password for invalid user nmq from 185.56.153.236 port 39178 ssh2
Feb  9 04:47:56 hpm sshd\[23189\]: Invalid user rsh from 185.56.153.236
Feb  9 04:47:56 hpm sshd\[23189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.236
2020-02-09 22:56:25
90.153.218.213 attack
Fail2Ban Ban Triggered
2020-02-09 22:53:48
180.71.47.198 attack
Feb  9 04:24:41 hpm sshd\[20008\]: Invalid user hdh from 180.71.47.198
Feb  9 04:24:41 hpm sshd\[20008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198
Feb  9 04:24:44 hpm sshd\[20008\]: Failed password for invalid user hdh from 180.71.47.198 port 59178 ssh2
Feb  9 04:27:53 hpm sshd\[20476\]: Invalid user qyq from 180.71.47.198
Feb  9 04:27:53 hpm sshd\[20476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198
2020-02-09 22:43:53
181.215.88.131 attack
(From eric@talkwithcustomer.com) 
Hi,

My name is Eric and I was looking at a few different sites online and came across your site staytunedchiropractic.com.  I must say - your website is very impressive.  I am seeing your website on the first page of the Search Engine. 

Have you noticed that 70 percent of visitors who leave your website will never return?  In most cases, this means that 95 percent to 98 percent of your marketing efforts are going to waste, not to mention that you are losing more money in customer acquisition costs than you need to.
 
As a business person, the time and money you put into your marketing efforts is extremely valuable.  So why let it go to waste?  Our users have seen staggering improvements in conversions with insane growths of 150 percent going upwards of 785 percent. Are you ready to unlock the highest conversion revenue from each of your website visitors?  

TalkWithCustomer is a widget which captures a website visitor’s Name, Email address and Phone Number and then
2020-02-09 23:12:51
113.253.218.251 attackbotsspam
Port probing on unauthorized port 5555
2020-02-09 22:57:09
146.185.25.183 attack
22222/tcp 5353/udp 4222/tcp...
[2019-12-13/2020-02-09]16pkt,7pt.(tcp),1pt.(udp)
2020-02-09 22:49:58
142.93.1.100 attack
Port 22 Scan, PTR: None
2020-02-09 23:01:50

Recently Reported IPs

13.234.160.181 13.234.195.219 102.78.151.50 13.234.199.180
13.234.205.118 13.234.228.97 13.234.22.12 13.234.24.203
13.234.219.216 13.234.246.225 13.234.246.203 13.234.25.48
13.234.252.235 13.234.229.3 13.234.208.245 13.234.254.19
13.234.52.56 13.234.44.38 13.234.49.121 13.234.6.128