Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cape Town

Region: Western Cape

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.245.236.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.245.236.137.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070101 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 00:01:51 CST 2020
;; MSG SIZE  rcvd: 118
Host info
137.236.245.13.in-addr.arpa domain name pointer ec2-13-245-236-137.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.236.245.13.in-addr.arpa	name = ec2-13-245-236-137.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
71.6.146.130 attackbots
Unauthorized connection attempt detected from IP address 71.6.146.130 to port 3460
2020-05-22 01:34:35
217.125.151.139 attack
Unauthorized connection attempt from IP address 217.125.151.139 on Port 445(SMB)
2020-05-22 01:56:18
123.23.171.134 attack
Unauthorized connection attempt from IP address 123.23.171.134 on Port 445(SMB)
2020-05-22 01:44:48
80.82.69.130 attackbots
scans 3 times in preceeding hours on the ports (in chronological order) 30030 30074 30027 resulting in total of 33 scans from 80.82.64.0/20 block.
2020-05-22 01:32:15
89.248.160.178 attack
TCP ports : 8895 / 39000 / 40003 / 45389 / 50839
2020-05-22 01:28:46
138.68.57.143 attack
Invalid user lqr from 138.68.57.143 port 39488
2020-05-22 02:00:33
114.119.166.146 attackbotsspam
Automatic report - Banned IP Access
2020-05-22 01:43:29
64.227.21.199 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 60 - port: 23230 proto: TCP cat: Misc Attack
2020-05-22 01:38:16
79.124.62.82 attack
05/21/2020-13:05:35.945982 79.124.62.82 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-22 01:33:31
91.231.14.129 attack
Repeated attempts to deliver spam
2020-05-22 01:45:08
180.156.245.15 attackspambots
fail2ban -- 180.156.245.15
...
2020-05-22 01:47:31
89.248.168.220 attack
Unauthorized connection attempt detected from IP address 89.248.168.220 to port 11000 [T]
2020-05-22 01:25:56
104.248.135.111 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 39022 resulting in total of 1 scans from 104.248.0.0/16 block.
2020-05-22 01:20:53
64.225.106.89 attackspambots
scans once in preceeding hours on the ports (in chronological order) 2757 resulting in total of 5 scans from 64.225.0.0/17 block.
2020-05-22 01:39:53
190.52.166.83 attackbots
Bruteforce detected by fail2ban
2020-05-22 01:51:27

Recently Reported IPs

211.144.98.149 83.250.234.216 188.19.190.155 51.106.110.156
198.236.82.137 48.121.80.200 220.197.113.203 65.237.201.239
128.238.74.113 168.182.185.106 99.169.218.109 150.93.27.205
54.112.119.170 202.31.87.19 116.103.106.218 159.180.80.96
174.171.238.111 154.77.32.41 12.52.36.231 2.107.254.14