Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.245.250.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.245.250.102.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:38:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
102.250.245.13.in-addr.arpa domain name pointer ec2-13-245-250-102.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
102.250.245.13.in-addr.arpa	name = ec2-13-245-250-102.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.123.240.187 attackspambots
Fail2Ban Ban Triggered
2019-11-20 01:07:36
151.53.100.177 attack
Website Spammer
2019-11-20 01:31:32
77.102.121.219 attackspam
firewall-block, port(s): 23/tcp
2019-11-20 01:38:29
119.40.33.22 attackbots
$f2bV_matches
2019-11-20 01:13:44
202.189.3.253 attack
Unauthorized connection attempt from IP address 202.189.3.253 on Port 445(SMB)
2019-11-20 01:28:11
46.238.53.245 attackspambots
Nov 19 11:16:45 askasleikir sshd[19938]: Failed password for invalid user ching from 46.238.53.245 port 35446 ssh2
Nov 19 11:42:04 askasleikir sshd[20085]: Failed password for invalid user home from 46.238.53.245 port 58446 ssh2
Nov 19 11:38:25 askasleikir sshd[20076]: Failed password for invalid user cssserver from 46.238.53.245 port 50022 ssh2
2019-11-20 01:49:06
222.186.175.183 attackspam
Nov 19 18:15:10 dedicated sshd[7504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Nov 19 18:15:12 dedicated sshd[7504]: Failed password for root from 222.186.175.183 port 63896 ssh2
2019-11-20 01:19:23
31.173.27.240 attackbotsspam
Unauthorized connection attempt from IP address 31.173.27.240 on Port 445(SMB)
2019-11-20 01:18:27
89.139.105.154 attackbots
firewall-block, port(s): 1433/tcp
2019-11-20 01:36:19
132.148.25.34 attackspam
Automatic report - XMLRPC Attack
2019-11-20 01:42:06
124.251.110.147 attackspam
Automatic report - Banned IP Access
2019-11-20 01:16:06
14.63.223.226 attack
SSH brute-force: detected 9 distinct usernames within a 24-hour window.
2019-11-20 01:22:41
170.233.43.253 attackbots
Unauthorized connection attempt from IP address 170.233.43.253 on Port 445(SMB)
2019-11-20 01:13:15
177.242.105.174 attackbotsspam
Unauthorized connection attempt from IP address 177.242.105.174 on Port 445(SMB)
2019-11-20 01:39:18
132.255.70.76 attack
xmlrpc attack
2019-11-20 01:37:27

Recently Reported IPs

166.157.108.77 124.139.93.59 250.253.5.176 65.213.165.186
226.0.124.35 87.61.5.21 144.184.51.185 117.199.156.147
95.126.69.87 37.184.72.143 150.227.166.188 4.178.20.117
70.149.234.120 75.136.214.215 137.229.141.16 255.225.119.102
153.87.111.110 22.216.77.185 108.179.156.247 212.112.219.78