Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.45.49.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.45.49.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 03:59:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 130.49.45.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.49.45.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.89.213.100 attackbotsspam
$f2bV_matches
2020-10-08 18:39:40
201.20.86.229 attack
445/tcp 445/tcp 445/tcp
[2020-08-22/10-07]3pkt
2020-10-08 18:51:14
51.75.170.128 attackbots
2020-10-08 05:27:09.094728-0500  localhost sshd[52732]: Failed password for root from 51.75.170.128 port 56082 ssh2
2020-10-08 18:46:18
185.63.253.200 proxy
Gabung
2020-10-08 18:36:18
148.72.153.223 attackspambots
Port scan denied
2020-10-08 18:40:33
51.254.79.229 attackbots
2020-10-08T08:04:54.084819abusebot-2.cloudsearch.cf sshd[15902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.79.229  user=root
2020-10-08T08:04:56.300243abusebot-2.cloudsearch.cf sshd[15902]: Failed password for root from 51.254.79.229 port 47888 ssh2
2020-10-08T08:07:54.614265abusebot-2.cloudsearch.cf sshd[15980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.79.229  user=root
2020-10-08T08:07:56.538810abusebot-2.cloudsearch.cf sshd[15980]: Failed password for root from 51.254.79.229 port 46606 ssh2
2020-10-08T08:10:50.206886abusebot-2.cloudsearch.cf sshd[16010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.79.229  user=root
2020-10-08T08:10:52.628022abusebot-2.cloudsearch.cf sshd[16010]: Failed password for root from 51.254.79.229 port 45264 ssh2
2020-10-08T08:13:44.609496abusebot-2.cloudsearch.cf sshd[16042]: pam_unix(sshd:auth): authe
...
2020-10-08 19:06:19
77.81.76.79 attackbots
445/tcp 445/tcp 445/tcp...
[2020-08-15/10-07]6pkt,1pt.(tcp)
2020-10-08 18:41:26
159.203.70.169 attackspambots
159.203.70.169 - - [08/Oct/2020:10:26:07 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.70.169 - - [08/Oct/2020:10:26:08 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.70.169 - - [08/Oct/2020:10:26:09 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-08 18:52:50
51.83.131.110 attack
Oct  8 12:16:20 nextcloud sshd\[5218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.131.110  user=root
Oct  8 12:16:22 nextcloud sshd\[5218\]: Failed password for root from 51.83.131.110 port 50462 ssh2
Oct  8 12:20:14 nextcloud sshd\[11056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.131.110  user=root
2020-10-08 19:01:52
103.207.38.197 attack
22/tcp 22/tcp 22/tcp...
[2020-08-24/10-07]12pkt,1pt.(tcp)
2020-10-08 18:37:48
167.114.251.164 attack
Automatic report - Banned IP Access
2020-10-08 18:43:44
62.210.151.21 attackspambots
[2020-10-08 06:27:27] NOTICE[1182][C-00001e9a] chan_sip.c: Call from '' (62.210.151.21:64490) to extension '8011441665529305' rejected because extension not found in context 'public'.
[2020-10-08 06:27:27] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-08T06:27:27.573-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="8011441665529305",SessionID="0x7f22f840cf98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/64490",ACLName="no_extension_match"
[2020-10-08 06:27:39] NOTICE[1182][C-00001e9b] chan_sip.c: Call from '' (62.210.151.21:64095) to extension '7011441665529305' rejected because extension not found in context 'public'.
[2020-10-08 06:27:39] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-08T06:27:39.235-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="7011441665529305",SessionID="0x7f22f8418138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/
...
2020-10-08 18:30:06
123.206.219.211 attack
2020-10-08 04:05:38.869671-0500  localhost sshd[44546]: Failed password for root from 123.206.219.211 port 60667 ssh2
2020-10-08 18:47:38
54.38.185.131 attack
SSH login attempts.
2020-10-08 19:00:59
27.76.13.65 attackbots
 TCP (SYN) 27.76.13.65:39858 -> port 23, len 44
2020-10-08 18:59:49

Recently Reported IPs

12.41.137.40 206.106.215.228 35.226.148.146 166.120.162.146
250.17.220.184 247.186.175.10 34.79.39.155 215.6.139.246
62.21.171.18 17.65.35.244 24.172.112.2 84.33.218.171
232.35.85.132 4.106.37.127 92.171.192.180 107.223.53.9
128.172.180.101 95.27.96.24 125.180.9.179 226.76.154.40