Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.249.36.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.249.36.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:15:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
148.36.249.13.in-addr.arpa domain name pointer server-13-249-36-148.iad89.r.cloudfront.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.36.249.13.in-addr.arpa	name = server-13-249-36-148.iad89.r.cloudfront.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.242.45.46 attack
Unauthorized connection attempt detected from IP address 178.242.45.46 to port 23
2020-05-30 01:09:36
179.62.38.62 attack
Unauthorized connection attempt detected from IP address 179.62.38.62 to port 23
2020-05-30 01:09:03
81.246.218.220 attack
Unauthorized connection attempt detected from IP address 81.246.218.220 to port 22
2020-05-30 01:35:52
114.42.149.149 attack
Port Scan
2020-05-30 01:25:19
106.75.166.128 attack
May 29 17:53:39 sip sshd[454326]: Failed password for invalid user swarze from 106.75.166.128 port 48513 ssh2
May 29 17:56:19 sip sshd[454338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.166.128  user=root
May 29 17:56:21 sip sshd[454338]: Failed password for root from 106.75.166.128 port 33559 ssh2
...
2020-05-30 01:28:02
114.33.13.181 attack
Port Scan
2020-05-30 01:25:41
175.9.247.42 attackspam
Unauthorized connection attempt detected from IP address 175.9.247.42 to port 23
2020-05-30 01:12:03
117.242.249.244 attackbots
Unauthorized connection attempt detected from IP address 117.242.249.244 to port 23
2020-05-30 01:21:13
139.219.5.244 attackbotsspam
139.219.5.244 - - [29/May/2020:18:56:21 +0200] "POST /wp-login.php HTTP/1.1" 200 6070 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
139.219.5.244 - - [29/May/2020:18:56:38 +0200] "POST /wp-login.php HTTP/1.1" 200 6070 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
139.219.5.244 - - [29/May/2020:18:56:51 +0200] "POST /wp-login.php HTTP/1.1" 200 6070 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
139.219.5.244 - - [29/May/2020:18:57:02 +0200] "POST /wp-login.php HTTP/1.1" 200 6070 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
139.219.5.244 - - [29/May/2020:18:57:04 +0200] "POST /wp-login.php HTTP/1.1" 200 6070 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safar
...
2020-05-30 01:15:10
103.253.1.227 attack
1590756596 - 05/29/2020 19:49:56 Host: 103.253.1.227/103.253.1.227 Port: 23 TCP Blocked
...
2020-05-30 01:29:10
103.52.217.89 attackspambots
Unauthorized connection attempt detected from IP address 103.52.217.89 to port 620
2020-05-30 01:29:42
78.85.48.225 attack
Port Scan
2020-05-30 01:37:17
86.104.16.109 attackspam
Unauthorized connection attempt detected from IP address 86.104.16.109 to port 23
2020-05-30 01:33:48
103.47.218.34 attackbotsspam
Unauthorized connection attempt detected from IP address 103.47.218.34 to port 80
2020-05-30 01:29:57
177.91.186.133 attack
Unauthorized connection attempt detected from IP address 177.91.186.133 to port 80
2020-05-30 01:11:04

Recently Reported IPs

193.25.149.183 246.145.31.196 129.66.183.16 254.47.184.190
252.146.27.166 19.172.246.144 14.46.194.62 146.226.111.109
207.68.188.106 157.54.92.23 116.91.127.51 30.222.65.206
66.179.15.29 85.12.166.94 124.38.150.186 244.193.99.108
209.5.20.99 92.25.23.86 89.125.75.113 71.33.98.62