Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.248.206.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.248.206.140.			IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:19:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
140.206.248.13.in-addr.arpa domain name pointer ae21ba23d941e3cc0.awsglobalaccelerator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.206.248.13.in-addr.arpa	name = ae21ba23d941e3cc0.awsglobalaccelerator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.189.124.135 attack
Automatic report - Port Scan Attack
2020-02-23 02:59:20
192.241.223.140 attackspambots
Hits on port : 2082
2020-02-23 02:49:28
27.120.113.50 attackbots
Invalid user git from 27.120.113.50 port 40068
2020-02-23 03:00:13
117.121.38.208 attack
Feb 22 18:34:45 dedicated sshd[8577]: Invalid user cpanellogin from 117.121.38.208 port 52112
2020-02-23 02:27:27
212.112.98.146 attackbotsspam
Feb 21 21:32:36 server sshd\[13829\]: Failed password for invalid user gnats from 212.112.98.146 port 41633 ssh2
Feb 22 20:38:14 server sshd\[10077\]: Invalid user deployer from 212.112.98.146
Feb 22 20:38:14 server sshd\[10077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.112.98.146 
Feb 22 20:38:16 server sshd\[10077\]: Failed password for invalid user deployer from 212.112.98.146 port 64839 ssh2
Feb 22 20:48:33 server sshd\[11774\]: Invalid user jstorm from 212.112.98.146
Feb 22 20:48:33 server sshd\[11774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.112.98.146 
...
2020-02-23 02:45:32
195.154.29.107 attackbotsspam
wp-login.php
2020-02-23 02:30:31
83.96.6.210 attack
Unauthorized connection attempt detected from IP address 83.96.6.210 to port 445
2020-02-23 02:32:34
211.203.177.53 attack
23/tcp
[2020-02-22]1pkt
2020-02-23 02:39:33
185.143.223.243 attack
02/22/2020-11:48:50.207123 185.143.223.243 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-23 02:57:55
211.21.37.63 attack
suspicious action Sat, 22 Feb 2020 14:08:16 -0300
2020-02-23 02:33:01
122.227.180.165 attackspambots
firewall-block, port(s): 1433/tcp
2020-02-23 02:48:32
222.186.175.167 attackspam
Feb 22 19:14:32 amit sshd\[29765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Feb 22 19:14:34 amit sshd\[29765\]: Failed password for root from 222.186.175.167 port 20998 ssh2
Feb 22 19:14:53 amit sshd\[29767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
...
2020-02-23 02:23:19
13.126.141.66 attackspambots
Automatic report - XMLRPC Attack
2020-02-23 02:54:22
122.51.75.72 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-02-23 02:18:20
192.241.213.101 attackspambots
suspicious action Sat, 22 Feb 2020 13:49:06 -0300
2020-02-23 02:47:35

Recently Reported IPs

13.248.206.68 13.248.207.119 13.248.207.130 13.248.209.12
13.248.207.79 13.248.207.191 13.248.210.204 13.248.207.23
13.248.211.60 13.248.212.3 13.248.214.142 13.248.211.117
13.248.213.94 13.248.215.107 13.248.214.181 13.248.215.188
13.248.216.157 13.248.216.222 13.248.217.222 13.248.217.226