Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.245.199.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.245.199.117.			IN	A

;; AUTHORITY SECTION:
.			242	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 02:35:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
117.199.245.13.in-addr.arpa domain name pointer ec2-13-245-199-117.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.199.245.13.in-addr.arpa	name = ec2-13-245-199-117.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.179.172.169 attackbots
Unauthorized connection attempt from IP address 1.179.172.169 on Port 445(SMB)
2019-09-17 18:50:47
188.131.132.70 attack
Sep 17 09:22:50 eventyay sshd[16617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.132.70
Sep 17 09:22:52 eventyay sshd[16617]: Failed password for invalid user test01 from 188.131.132.70 port 46514 ssh2
Sep 17 09:27:35 eventyay sshd[16715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.132.70
...
2019-09-17 19:05:44
206.189.138.231 attackbots
Invalid user a from 206.189.138.231 port 41430
2019-09-17 19:13:12
104.248.10.36 attack
104.248.10.36 - - [17/Sep/2019:13:15:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.10.36 - - [17/Sep/2019:13:15:41 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.10.36 - - [17/Sep/2019:13:15:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.10.36 - - [17/Sep/2019:13:15:41 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.10.36 - - [17/Sep/2019:13:15:42 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.10.36 - - [17/Sep/2019:13:15:42 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-09-17 19:25:02
45.80.65.76 attackspambots
Sep 17 07:05:50 pkdns2 sshd\[41348\]: Invalid user m1122 from 45.80.65.76Sep 17 07:05:52 pkdns2 sshd\[41348\]: Failed password for invalid user m1122 from 45.80.65.76 port 59316 ssh2Sep 17 07:10:23 pkdns2 sshd\[41554\]: Invalid user weblogic from 45.80.65.76Sep 17 07:10:24 pkdns2 sshd\[41554\]: Failed password for invalid user weblogic from 45.80.65.76 port 46694 ssh2Sep 17 07:14:55 pkdns2 sshd\[41694\]: Invalid user x-bot from 45.80.65.76Sep 17 07:14:58 pkdns2 sshd\[41694\]: Failed password for invalid user x-bot from 45.80.65.76 port 33954 ssh2
...
2019-09-17 18:21:43
104.236.31.227 attack
Sep 17 07:38:57 h2177944 sshd\[4976\]: Invalid user pc from 104.236.31.227 port 40175
Sep 17 07:38:57 h2177944 sshd\[4976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.31.227
Sep 17 07:38:59 h2177944 sshd\[4976\]: Failed password for invalid user pc from 104.236.31.227 port 40175 ssh2
Sep 17 07:43:36 h2177944 sshd\[5220\]: Invalid user kmathieu from 104.236.31.227 port 33828
...
2019-09-17 19:23:45
113.67.127.146 attackbotsspam
Automatic report - Port Scan Attack
2019-09-17 19:24:25
113.161.1.111 attack
Sep 17 11:38:50 eventyay sshd[19563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.1.111
Sep 17 11:38:52 eventyay sshd[19563]: Failed password for invalid user hp from 113.161.1.111 port 54981 ssh2
Sep 17 11:43:41 eventyay sshd[19678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.1.111
...
2019-09-17 19:37:22
14.251.183.65 attackspambots
Unauthorized connection attempt from IP address 14.251.183.65 on Port 445(SMB)
2019-09-17 19:31:29
1.0.185.3 attackbots
Unauthorized connection attempt from IP address 1.0.185.3 on Port 445(SMB)
2019-09-17 18:58:35
51.159.28.192 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-09-17 19:34:27
104.237.253.195 attackspambots
Sep 17 06:50:47 www sshd\[5342\]: Invalid user uuidd from 104.237.253.195Sep 17 06:50:48 www sshd\[5342\]: Failed password for invalid user uuidd from 104.237.253.195 port 34162 ssh2Sep 17 06:54:26 www sshd\[5410\]: Invalid user alumno from 104.237.253.195
...
2019-09-17 19:32:16
14.228.247.223 attackbotsspam
Sep 17 03:33:12 MK-Soft-VM3 sshd\[24347\]: Invalid user admin from 14.228.247.223 port 52191
Sep 17 03:33:12 MK-Soft-VM3 sshd\[24347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.228.247.223
Sep 17 03:33:14 MK-Soft-VM3 sshd\[24347\]: Failed password for invalid user admin from 14.228.247.223 port 52191 ssh2
...
2019-09-17 18:55:25
116.31.105.149 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/116.31.105.149/ 
 CN - 1H : (304)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN134764 
 
 IP : 116.31.105.149 
 
 CIDR : 116.31.96.0/19 
 
 PREFIX COUNT : 144 
 
 UNIQUE IP COUNT : 177920 
 
 
 WYKRYTE ATAKI Z ASN134764 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-17 18:28:10
117.60.133.9 attackspam
Unauthorised access (Sep 17) SRC=117.60.133.9 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=25200 TCP DPT=8080 WINDOW=17209 SYN 
Unauthorised access (Sep 16) SRC=117.60.133.9 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=50566 TCP DPT=8080 WINDOW=46813 SYN
2019-09-17 18:27:07

Recently Reported IPs

157.22.210.166 91.2.212.89 76.233.43.175 142.80.246.91
242.154.75.54 220.83.239.77 91.157.139.211 94.45.204.38
61.195.67.36 161.150.114.194 106.97.181.74 24.45.168.24
30.14.191.186 50.87.144.150 157.18.55.253 237.60.237.250
72.84.246.134 218.221.230.128 243.243.56.49 70.8.77.57