Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.49.80.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.49.80.10.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:48:09 CST 2022
;; MSG SIZE  rcvd: 104
Host info
10.80.49.13.in-addr.arpa domain name pointer ec2-13-49-80-10.eu-north-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
10.80.49.13.in-addr.arpa	name = ec2-13-49-80-10.eu-north-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
209.59.154.141 attackspambots
Port scan: Attack repeated for 24 hours
2020-08-13 04:27:28
192.3.105.180 attackspam
Invalid user fake from 192.3.105.180 port 35016
2020-08-13 04:30:29
220.133.227.59 attackbots
 TCP (SYN) 220.133.227.59:9139 -> port 23, len 44
2020-08-13 04:08:30
59.97.43.217 attackbotsspam
 TCP (SYN) 59.97.43.217:32912 -> port 23, len 44
2020-08-13 04:21:15
45.86.198.109 attack
 TCP (SYN) 45.86.198.109:59118 -> port 1080, len 52
2020-08-13 04:05:33
219.68.2.113 attack
 TCP (SYN) 219.68.2.113:43441 -> port 23, len 44
2020-08-13 04:08:59
192.35.168.46 attackspambots
 TCP (SYN) 192.35.168.46:49229 -> port 443, len 44
2020-08-13 04:29:58
45.137.22.62 attackspambots
Aug 12 14:39:02 web2 sshd[26392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.137.22.62
Aug 12 14:39:04 web2 sshd[26392]: Failed password for invalid user kjw92 from 45.137.22.62 port 52865 ssh2
2020-08-13 04:22:36
223.71.167.164 attackbots
 TCP (SYN) 223.71.167.164:44529 -> port 11211, len 44
2020-08-13 04:08:17
161.97.68.246 attack
*Port Scan* detected from 161.97.68.246 (DE/Germany/Bavaria/Munich (Ramersdorf-Perlach)/vmi405205.contaboserver.net). 4 hits in the last 285 seconds
2020-08-13 04:14:23
202.88.241.118 attack
 TCP (SYN) 202.88.241.118:45428 -> port 1433, len 44
2020-08-13 04:27:44
74.128.110.206 attackspambots
 TCP (SYN) 74.128.110.206:23418 -> port 23, len 44
2020-08-13 04:03:30
89.248.160.150 attackbots
 UDP 89.248.160.150:57635 -> port 41158, len 57
2020-08-13 04:18:05
194.31.141.157 attackspam
 TCP (SYN) 194.31.141.157:41195 -> port 1433, len 44
2020-08-13 04:12:10
116.100.43.191 attack
 TCP (SYN) 116.100.43.191:37183 -> port 23, len 44
2020-08-13 04:16:29

Recently Reported IPs

13.49.63.83 184.235.43.176 13.49.89.79 13.51.124.229
13.5.194.93 13.51.129.231 13.51.197.1 13.51.158.238
13.51.131.184 13.51.157.71 13.51.17.148 13.51.137.238
13.51.223.247 13.51.241.67 13.51.37.73 13.51.39.238
13.51.43.36 13.51.56.169 13.52.100.244 13.51.76.197