Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.49.205.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.49.205.252.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:09:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
252.205.49.13.in-addr.arpa domain name pointer ec2-13-49-205-252.eu-north-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.205.49.13.in-addr.arpa	name = ec2-13-49-205-252.eu-north-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.26 attackbots
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-29 10:48:49
14.6.200.22 attackspam
Aug 28 21:28:03 aat-srv002 sshd[1594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.6.200.22
Aug 28 21:28:05 aat-srv002 sshd[1594]: Failed password for invalid user vivian from 14.6.200.22 port 57082 ssh2
Aug 28 21:33:21 aat-srv002 sshd[1752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.6.200.22
Aug 28 21:33:22 aat-srv002 sshd[1752]: Failed password for invalid user ssms from 14.6.200.22 port 46522 ssh2
...
2019-08-29 10:56:55
195.9.32.22 attackspambots
Aug 29 05:36:55 yabzik sshd[23577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22
Aug 29 05:36:56 yabzik sshd[23577]: Failed password for invalid user magda from 195.9.32.22 port 52821 ssh2
Aug 29 05:42:39 yabzik sshd[25799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22
2019-08-29 10:52:58
180.178.106.124 attack
Aug 29 05:40:15 srv-4 sshd\[26196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.178.106.124  user=root
Aug 29 05:40:17 srv-4 sshd\[26196\]: Failed password for root from 180.178.106.124 port 59672 ssh2
Aug 29 05:45:23 srv-4 sshd\[26418\]: Invalid user mega from 180.178.106.124
Aug 29 05:45:23 srv-4 sshd\[26418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.178.106.124
...
2019-08-29 10:59:02
42.247.22.66 attackspambots
Aug 28 17:17:10 tdfoods sshd\[8996\]: Invalid user tomcat from 42.247.22.66
Aug 28 17:17:10 tdfoods sshd\[8996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.247.22.66
Aug 28 17:17:11 tdfoods sshd\[8996\]: Failed password for invalid user tomcat from 42.247.22.66 port 32871 ssh2
Aug 28 17:21:07 tdfoods sshd\[9379\]: Invalid user swg from 42.247.22.66
Aug 28 17:21:07 tdfoods sshd\[9379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.247.22.66
2019-08-29 11:34:58
185.176.27.106 attackbotsspam
08/28/2019-22:14:25.110872 185.176.27.106 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-29 10:52:09
165.227.157.168 attack
Aug 29 04:40:57 eventyay sshd[11204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168
Aug 29 04:40:59 eventyay sshd[11204]: Failed password for invalid user florian from 165.227.157.168 port 54496 ssh2
Aug 29 04:44:55 eventyay sshd[12219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168
...
2019-08-29 10:49:48
1.56.207.131 attackbotsspam
Aug 29 05:51:01 www5 sshd\[17938\]: Invalid user kai from 1.56.207.131
Aug 29 05:51:01 www5 sshd\[17938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.56.207.131
Aug 29 05:51:03 www5 sshd\[17938\]: Failed password for invalid user kai from 1.56.207.131 port 56049 ssh2
...
2019-08-29 11:31:35
192.99.10.122 attackbots
*Port Scan* detected from 192.99.10.122 (CA/Canada/ns502491.ip-192-99-10.net). 4 hits in the last 245 seconds
2019-08-29 11:39:21
103.3.226.230 attackbots
Aug 28 16:43:56 lcdev sshd\[15595\]: Invalid user halt from 103.3.226.230
Aug 28 16:43:56 lcdev sshd\[15595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230
Aug 28 16:43:58 lcdev sshd\[15595\]: Failed password for invalid user halt from 103.3.226.230 port 34608 ssh2
Aug 28 16:49:10 lcdev sshd\[16088\]: Invalid user kathrine from 103.3.226.230
Aug 28 16:49:10 lcdev sshd\[16088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230
2019-08-29 10:49:25
175.138.52.116 attackspam
Aug 29 03:08:35 web8 sshd\[7444\]: Invalid user testuser1 from 175.138.52.116
Aug 29 03:08:35 web8 sshd\[7444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.52.116
Aug 29 03:08:37 web8 sshd\[7444\]: Failed password for invalid user testuser1 from 175.138.52.116 port 41280 ssh2
Aug 29 03:14:16 web8 sshd\[10235\]: Invalid user ftpuser from 175.138.52.116
Aug 29 03:14:16 web8 sshd\[10235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.52.116
2019-08-29 11:23:33
185.177.190.76 attack
MYH,DEF GET /downloader/
2019-08-29 11:01:33
185.36.81.129 attack
Aug 29 04:20:41 cp sshd[26421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.36.81.129
2019-08-29 11:10:21
118.114.241.104 attack
Aug 29 03:14:43 localhost sshd\[8375\]: Invalid user manager from 118.114.241.104 port 44344
Aug 29 03:14:43 localhost sshd\[8375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.114.241.104
Aug 29 03:14:44 localhost sshd\[8375\]: Failed password for invalid user manager from 118.114.241.104 port 44344 ssh2
2019-08-29 11:08:10
165.22.129.134 attack
Aug 29 03:25:18 debian sshd\[2044\]: Invalid user joanne from 165.22.129.134 port 58008
Aug 29 03:25:18 debian sshd\[2044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.129.134
...
2019-08-29 11:04:39

Recently Reported IPs

13.49.21.201 118.172.148.70 13.49.22.0 13.49.228.169
13.49.215.248 13.49.229.109 118.172.148.75 13.49.233.69
13.49.28.129 13.49.251.194 13.49.28.177 13.49.234.176
13.49.236.211 13.49.35.142 13.49.34.123 118.172.148.88
13.49.35.37 13.49.36.100 13.49.36.142 13.49.6.100