Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.245.131.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38410
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.245.131.68.			IN	A

;; AUTHORITY SECTION:
.			376	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:08:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
68.131.245.13.in-addr.arpa domain name pointer ec2-13-245-131-68.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.131.245.13.in-addr.arpa	name = ec2-13-245-131-68.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.206.36.64 attackspam
Unauthorized connection attempt from IP address 88.206.36.64 on Port 445(SMB)
2020-09-24 23:58:11
125.212.153.231 attackspambots
Unauthorized connection attempt from IP address 125.212.153.231 on Port 445(SMB)
2020-09-24 23:38:27
49.205.158.123 attackbotsspam
Sep 24 17:53:01 pve1 sshd[11603]: Failed password for root from 49.205.158.123 port 53828 ssh2
...
2020-09-25 00:14:24
160.153.156.137 attackbotsspam
C1,WP GET /humor/newsite/wp-includes/wlwmanifest.xml
2020-09-24 23:48:28
103.147.64.179 attackbotsspam
20 attempts against mh-misbehave-ban on pluto
2020-09-24 23:57:37
40.70.221.167 attack
Sep 23 13:56:02 v26 sshd[23952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.221.167  user=r.r
Sep 23 13:56:02 v26 sshd[23954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.221.167  user=r.r
Sep 23 13:56:02 v26 sshd[23955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.221.167  user=r.r
Sep 23 13:56:02 v26 sshd[23957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.221.167  user=r.r
Sep 23 13:56:02 v26 sshd[23956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.221.167  user=r.r
Sep 23 13:56:04 v26 sshd[23952]: Failed password for r.r from 40.70.221.167 port 52689 ssh2
Sep 23 13:56:04 v26 sshd[23954]: Failed password for r.r from 40.70.221.167 port 52690 ssh2
Sep 23 13:56:04 v26 sshd[23955]: Failed password for r.r from 40.70.221.167........
-------------------------------
2020-09-24 23:47:13
178.74.102.1 attack
Unauthorized connection attempt from IP address 178.74.102.1 on Port 445(SMB)
2020-09-25 00:02:22
87.145.222.6 attackbotsspam
Email rejected due to spam filtering
2020-09-24 23:44:03
222.186.15.115 attack
Sep 24 17:50:07 piServer sshd[13823]: Failed password for root from 222.186.15.115 port 13648 ssh2
Sep 24 17:50:11 piServer sshd[13823]: Failed password for root from 222.186.15.115 port 13648 ssh2
Sep 24 17:50:14 piServer sshd[13823]: Failed password for root from 222.186.15.115 port 13648 ssh2
...
2020-09-24 23:51:20
113.22.236.73 attack
Unauthorized connection attempt from IP address 113.22.236.73 on Port 445(SMB)
2020-09-24 23:44:32
52.255.192.248 attackbotsspam
2020-09-24 10:30:22.202502-0500  localhost sshd[10602]: Failed password for root from 52.255.192.248 port 29420 ssh2
2020-09-24 23:49:33
27.216.198.110 attackbotsspam
Port Scan detected!
...
2020-09-24 23:37:35
196.52.43.127 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-09-24 23:33:27
178.62.6.215 attackbots
Invalid user development from 178.62.6.215 port 40914
2020-09-24 23:59:36
49.68.147.49 attackbots
$f2bV_matches
2020-09-24 23:33:48

Recently Reported IPs

13.244.206.101 13.238.37.236 13.244.223.222 13.244.226.183
13.245.51.152 13.245.210.231 144.195.57.7 13.246.4.246
13.245.23.220 13.248.143.250 13.248.171.91 13.248.132.155
13.248.177.167 13.246.60.179 13.248.191.41 13.248.179.79
13.248.173.5 13.248.198.237 13.248.191.176 13.248.193.144