Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.245.130.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.245.130.117.			IN	A

;; AUTHORITY SECTION:
.			119	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 03:22:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
117.130.245.13.in-addr.arpa domain name pointer ec2-13-245-130-117.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.130.245.13.in-addr.arpa	name = ec2-13-245-130-117.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.75.153.230 attackspambots
Invalid user cur from 51.75.153.230 port 34454
2019-11-20 03:14:55
138.197.33.113 attack
Nov 19 17:16:53 ns37 sshd[5603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.33.113
2019-11-20 02:42:48
59.108.60.58 attack
fraudulent SSH attempt
2019-11-20 02:52:01
167.71.161.253 attackspambots
Invalid user fake from 167.71.161.253 port 57886
2019-11-20 03:00:30
182.61.39.254 attack
Invalid user fahad from 182.61.39.254 port 37826
2019-11-20 02:58:15
113.162.186.150 attackbots
Invalid user admin from 113.162.186.150 port 37357
2019-11-20 03:06:42
125.161.139.148 attackbotsspam
Invalid user pi from 125.161.139.148 port 50862
2019-11-20 02:43:52
190.64.137.171 attackbots
Invalid user rebeka from 190.64.137.171 port 43870
2019-11-20 02:57:45
218.219.246.124 attackbotsspam
2019-11-19T19:45:12.160386struts4.enskede.local sshd\[31482\]: Invalid user test from 218.219.246.124 port 40594
2019-11-19T19:45:12.169893struts4.enskede.local sshd\[31482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l246124.ppp.asahi-net.or.jp
2019-11-19T19:45:14.859091struts4.enskede.local sshd\[31482\]: Failed password for invalid user test from 218.219.246.124 port 40594 ssh2
2019-11-19T19:48:43.273188struts4.enskede.local sshd\[31485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l246124.ppp.asahi-net.or.jp  user=root
2019-11-19T19:48:46.641997struts4.enskede.local sshd\[31485\]: Failed password for root from 218.219.246.124 port 60480 ssh2
...
2019-11-20 02:55:44
14.161.6.201 attackspam
$f2bV_matches
2019-11-20 02:53:27
14.161.23.118 attackbotsspam
Invalid user admin from 14.161.23.118 port 56698
2019-11-20 03:18:54
14.139.243.173 attackbotsspam
Nov 19 15:52:27 XXX sshd[36646]: Invalid user ofsaa from 14.139.243.173 port 36220
2019-11-20 03:19:12
121.69.130.2 attack
Nov 19 21:54:58 microserver sshd[30530]: Invalid user guest from 121.69.130.2 port 2156
Nov 19 21:54:58 microserver sshd[30530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.130.2
Nov 19 21:55:00 microserver sshd[30530]: Failed password for invalid user guest from 121.69.130.2 port 2156 ssh2
Nov 19 21:58:14 microserver sshd[31108]: Invalid user maible from 121.69.130.2 port 2157
Nov 19 21:58:14 microserver sshd[31108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.130.2
Nov 19 22:10:45 microserver sshd[33047]: Invalid user uzziah from 121.69.130.2 port 2161
Nov 19 22:10:46 microserver sshd[33047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.130.2
Nov 19 22:10:48 microserver sshd[33047]: Failed password for invalid user uzziah from 121.69.130.2 port 2161 ssh2
Nov 19 22:13:46 microserver sshd[33225]: Invalid user arbogast from 121.69.130.2 port 2162
Nov 19 22:13:4
2019-11-20 02:44:27
206.81.11.216 attackbots
Automatic report - Banned IP Access
2019-11-20 03:20:49
212.64.114.254 attackspam
2019-11-19T18:50:37.792509abusebot-7.cloudsearch.cf sshd\[22508\]: Invalid user webin from 212.64.114.254 port 45200
2019-11-20 02:56:38

Recently Reported IPs

53.139.74.151 148.210.2.114 17.172.179.162 229.104.40.137
177.73.181.190 122.34.88.48 187.114.164.81 21.151.12.43
172.51.253.75 53.58.95.181 234.219.139.135 9.43.64.249
228.143.27.173 63.136.134.70 254.198.213.71 8.254.168.235
210.15.19.150 191.145.245.74 49.208.179.185 252.62.129.1