Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.246.220.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.246.220.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 07:06:28 CST 2025
;; MSG SIZE  rcvd: 107
Host info
131.220.246.13.in-addr.arpa domain name pointer ec2-13-246-220-131.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.220.246.13.in-addr.arpa	name = ec2-13-246-220-131.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.179 attack
Jan 19 12:41:04 firewall sshd[3827]: Failed password for root from 218.92.0.179 port 15687 ssh2
Jan 19 12:41:18 firewall sshd[3827]: error: maximum authentication attempts exceeded for root from 218.92.0.179 port 15687 ssh2 [preauth]
Jan 19 12:41:18 firewall sshd[3827]: Disconnecting: Too many authentication failures [preauth]
...
2020-01-20 00:00:24
188.218.155.193 attackbots
Unauthorized connection attempt detected from IP address 188.218.155.193 to port 8000 [J]
2020-01-19 23:39:56
106.12.82.70 attackbots
Unauthorized connection attempt detected from IP address 106.12.82.70 to port 2220 [J]
2020-01-19 23:37:16
190.100.3.142 attack
Honeypot attack, port: 445, PTR: pc-142-3-100-190.cm.vtr.net.
2020-01-19 23:20:52
92.222.127.232 attack
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
2020-01-19 23:38:07
218.92.0.168 attackspam
Jan 19 16:34:47 minden010 sshd[13328]: Failed password for root from 218.92.0.168 port 6423 ssh2
Jan 19 16:34:50 minden010 sshd[13328]: Failed password for root from 218.92.0.168 port 6423 ssh2
Jan 19 16:34:53 minden010 sshd[13328]: Failed password for root from 218.92.0.168 port 6423 ssh2
Jan 19 16:34:57 minden010 sshd[13328]: Failed password for root from 218.92.0.168 port 6423 ssh2
...
2020-01-19 23:53:50
114.67.76.63 attackbots
Automatic report - Banned IP Access
2020-01-19 23:19:08
92.118.37.55 attackspambots
Jan 19 16:51:25 h2177944 kernel: \[2647440.427014\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18436 PROTO=TCP SPT=57737 DPT=11913 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan 19 16:51:25 h2177944 kernel: \[2647440.427028\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18436 PROTO=TCP SPT=57737 DPT=11913 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan 19 16:51:55 h2177944 kernel: \[2647470.070266\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=29840 PROTO=TCP SPT=57737 DPT=10190 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan 19 16:51:55 h2177944 kernel: \[2647470.070276\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=29840 PROTO=TCP SPT=57737 DPT=10190 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan 19 16:55:56 h2177944 kernel: \[2647711.120874\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.55 DST=85.214.117.9
2020-01-20 00:01:32
1.52.140.39 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-19 23:48:12
60.243.93.49 attack
Unauthorized connection attempt from 60.243.93.49:49954->xxxx:23 (Telnet)
2020-01-19 23:29:43
123.207.14.76 attackspam
Jan 19 15:42:38 vps691689 sshd[19195]: Failed password for root from 123.207.14.76 port 46294 ssh2
Jan 19 15:44:35 vps691689 sshd[19310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.14.76
...
2020-01-19 23:27:47
70.37.49.155 attack
Unauthorized connection attempt detected from IP address 70.37.49.155 to port 2220 [J]
2020-01-19 23:59:41
87.248.90.235 attack
Honeypot attack, port: 81, PTR: static-ip-87-248-90-235.promax.media.pl.
2020-01-19 23:48:41
177.124.88.1 attack
2020-01-19T09:03:47.0534371495-001 sshd[57624]: Invalid user dodsserver from 177.124.88.1 port 43166
2020-01-19T09:03:47.0621471495-001 sshd[57624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.88.1
2020-01-19T09:03:47.0534371495-001 sshd[57624]: Invalid user dodsserver from 177.124.88.1 port 43166
2020-01-19T09:03:49.1194081495-001 sshd[57624]: Failed password for invalid user dodsserver from 177.124.88.1 port 43166 ssh2
2020-01-19T09:06:58.7703651495-001 sshd[57699]: Invalid user helpdesk from 177.124.88.1 port 55537
2020-01-19T09:06:58.7794281495-001 sshd[57699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.88.1
2020-01-19T09:06:58.7703651495-001 sshd[57699]: Invalid user helpdesk from 177.124.88.1 port 55537
2020-01-19T09:07:00.7217021495-001 sshd[57699]: Failed password for invalid user helpdesk from 177.124.88.1 port 55537 ssh2
2020-01-19T09:10:04.9830731495-001 sshd[57825]: Inva
...
2020-01-19 23:45:14
91.153.26.103 attackbots
Unauthorized connection attempt detected from IP address 91.153.26.103 to port 5555 [J]
2020-01-19 23:54:11

Recently Reported IPs

18.221.114.243 165.247.234.223 250.93.56.49 79.53.57.114
250.209.236.40 246.5.90.238 159.52.196.44 154.87.187.30
246.233.230.41 2.51.100.129 219.110.224.220 24.127.116.157
170.251.229.99 32.183.105.51 223.207.94.103 64.139.104.217
200.61.50.44 247.78.66.142 232.107.188.191 177.78.123.194