Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.248.208.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.248.208.21.			IN	A

;; AUTHORITY SECTION:
.			47	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:46:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
21.208.248.13.in-addr.arpa domain name pointer ac04d9df1d59761a7.awsglobalaccelerator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.208.248.13.in-addr.arpa	name = ac04d9df1d59761a7.awsglobalaccelerator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.54.171.132 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-30 05:46:10]
2019-06-30 12:04:19
189.173.149.121 attack
Honeypot attack, port: 23, PTR: dsl-189-173-149-121-dyn.prod-infinitum.com.mx.
2019-06-30 11:48:22
220.178.107.242 attackbots
'IP reached maximum auth failures for a one day block'
2019-06-30 12:17:49
221.205.77.106 attack
2323/tcp
[2019-06-30]1pkt
2019-06-30 12:12:43
159.89.201.212 attack
Jun 26 13:35:43 mailserver sshd[22980]: Invalid user test from 159.89.201.212
Jun 26 13:35:44 mailserver sshd[22980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.212
Jun 26 13:35:46 mailserver sshd[22980]: Failed password for invalid user test from 159.89.201.212 port 62269 ssh2
Jun 26 13:35:46 mailserver sshd[22980]: Connection closed by 159.89.201.212 port 62269 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.89.201.212
2019-06-30 11:58:33
177.1.214.207 attackbots
web-1 [ssh] SSH Attack
2019-06-30 11:59:02
202.29.70.46 attackbots
2019-06-29T18:46:34.661429Z 0057d11129e5 New connection: 202.29.70.46:50118 (172.17.0.4:2222) [session: 0057d11129e5]
2019-06-29T18:46:50.869745Z 45b181e92b7d New connection: 202.29.70.46:45264 (172.17.0.4:2222) [session: 45b181e92b7d]
2019-06-30 11:47:55
97.89.219.122 attackbots
Jun 30 06:27:19 core01 sshd\[14506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.89.219.122  user=root
Jun 30 06:27:21 core01 sshd\[14506\]: Failed password for root from 97.89.219.122 port 53848 ssh2
...
2019-06-30 12:28:06
178.128.79.169 attackbotsspam
SSH-BRUTEFORCE
2019-06-30 11:45:29
218.173.160.112 attackspambots
37215/tcp
[2019-06-30]1pkt
2019-06-30 12:32:56
74.82.47.31 attackspam
5900/tcp 548/tcp 5555/tcp...
[2019-04-30/06-30]59pkt,16pt.(tcp),2pt.(udp)
2019-06-30 12:07:31
218.11.223.146 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 12:11:44
119.93.145.214 attackbotsspam
445/tcp
[2019-06-30]1pkt
2019-06-30 12:22:37
115.48.207.38 attackbots
SSH/22 MH Probe, BF, Hack -
2019-06-30 12:18:25
107.170.194.158 attackbotsspam
2082/tcp 109/tcp 10395/tcp...
[2019-04-30/06-30]32pkt,26pt.(tcp),3pt.(udp)
2019-06-30 11:55:29

Recently Reported IPs

13.248.206.103 13.248.210.90 13.248.211.14 13.248.212.220
13.248.236.35 13.248.223.81 13.248.238.173 13.248.222.104
13.248.242.204 13.248.243.4 13.249.118.23 13.249.118.47
13.249.118.55 13.249.118.5 13.249.118.58 13.249.118.73
13.249.118.90 13.249.127.172 13.249.134.94 13.249.135.46