Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.248.129.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.248.129.84.			IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 13:13:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
84.129.248.13.in-addr.arpa domain name pointer a48b020da84a5b2b2.awsglobalaccelerator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
84.129.248.13.in-addr.arpa	name = a48b020da84a5b2b2.awsglobalaccelerator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.63.196.23 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:42:42
111.229.167.10 attackspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-10-01 08:07:06
139.59.11.66 attackspambots
Scanned 67 times in the last 24 hours on port 22
2020-10-01 08:07:44
177.41.186.19 attackspambots
SSH Invalid Login
2020-10-01 08:13:44
201.48.192.60 attackspambots
$f2bV_matches
2020-10-01 07:59:39
51.178.182.35 attackbotsspam
5x Failed Password
2020-10-01 08:03:32
74.120.14.17 attackbotsspam
 TCP (SYN) 74.120.14.17:16491 -> port 443, len 44
2020-10-01 07:46:28
202.105.98.210 attackspambots
Brute%20Force%20SSH
2020-10-01 07:57:01
104.206.128.74 attackspambots
 TCP (SYN) 104.206.128.74:56014 -> port 3389, len 44
2020-10-01 07:39:03
134.209.149.64 attack
SSH bruteforce
2020-10-01 07:58:12
45.129.33.49 attackbots
Excessive Port-Scanning
2020-10-01 07:52:29
82.196.3.36 attackbotsspam
Oct  1 00:41:27 * sshd[20231]: Failed password for git from 82.196.3.36 port 34072 ssh2
2020-10-01 08:05:40
49.234.126.83 attack
Sep 30 23:31:36 Horstpolice sshd[9922]: Invalid user roy from 49.234.126.83 port 51970
Sep 30 23:31:36 Horstpolice sshd[9922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.126.83


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.234.126.83
2020-10-01 08:14:01
45.129.33.43 attackbots
scans 13 times in preceeding hours on the ports (in chronological order) 28571 28954 28599 28505 28727 28879 28604 28928 28739 28835 28974 28758 28723 resulting in total of 113 scans from 45.129.33.0/24 block.
2020-10-01 07:52:47
46.161.27.75 attackbotsspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:50:02

Recently Reported IPs

13.239.81.121 13.248.131.173 13.248.148.200 13.248.159.49
13.248.170.186 13.248.161.18 13.248.147.123 13.248.147.66
13.248.236.203 13.248.239.234 13.248.239.99 13.248.237.24
13.248.240.147 13.248.235.239 13.248.237.219 13.248.235.245
13.248.240.64 13.248.239.26 1.20.250.223 13.248.223.103