Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.57.64.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.57.64.149.			IN	A

;; AUTHORITY SECTION:
.			259	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:53:54 CST 2022
;; MSG SIZE  rcvd: 105
Host info
149.64.57.13.in-addr.arpa domain name pointer ec2-13-57-64-149.us-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.64.57.13.in-addr.arpa	name = ec2-13-57-64-149.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
133.130.123.238 attackbotsspam
Dec  1 17:06:13 ns3042688 sshd\[31780\]: Invalid user p@55w0rd from 133.130.123.238
Dec  1 17:06:15 ns3042688 sshd\[31780\]: Failed password for invalid user p@55w0rd from 133.130.123.238 port 50534 ssh2
Dec  1 17:09:22 ns3042688 sshd\[463\]: Invalid user salladay from 133.130.123.238
Dec  1 17:09:23 ns3042688 sshd\[463\]: Failed password for invalid user salladay from 133.130.123.238 port 58520 ssh2
Dec  1 17:12:40 ns3042688 sshd\[1695\]: Invalid user jashvant from 133.130.123.238
...
2019-12-02 00:42:26
140.143.248.69 attackbots
ssh failed login
2019-12-02 00:33:33
86.74.40.71 attack
Dec  1 04:44:47 auw2 sshd\[27677\]: Invalid user pi from 86.74.40.71
Dec  1 04:44:47 auw2 sshd\[27678\]: Invalid user pi from 86.74.40.71
Dec  1 04:44:47 auw2 sshd\[27677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.40.74.86.rev.sfr.net
Dec  1 04:44:47 auw2 sshd\[27678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.40.74.86.rev.sfr.net
Dec  1 04:44:49 auw2 sshd\[27677\]: Failed password for invalid user pi from 86.74.40.71 port 42348 ssh2
Dec  1 04:44:49 auw2 sshd\[27678\]: Failed password for invalid user pi from 86.74.40.71 port 42350 ssh2
2019-12-02 00:04:21
222.186.180.147 attackbotsspam
2019-12-01T16:18:43.360345shield sshd\[21003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
2019-12-01T16:18:44.977059shield sshd\[21003\]: Failed password for root from 222.186.180.147 port 38698 ssh2
2019-12-01T16:18:48.267470shield sshd\[21003\]: Failed password for root from 222.186.180.147 port 38698 ssh2
2019-12-01T16:18:51.975175shield sshd\[21003\]: Failed password for root from 222.186.180.147 port 38698 ssh2
2019-12-01T16:18:54.893870shield sshd\[21003\]: Failed password for root from 222.186.180.147 port 38698 ssh2
2019-12-02 00:19:55
118.97.77.114 attackspambots
Dec  1 11:31:03 plusreed sshd[8428]: Invalid user jiuhuai from 118.97.77.114
...
2019-12-02 00:39:52
49.234.17.109 attack
2019-12-01T16:16:26.145350abusebot-7.cloudsearch.cf sshd\[16408\]: Invalid user buerkle from 49.234.17.109 port 57916
2019-12-02 00:21:56
188.131.189.12 attackspambots
Dec  1 05:48:49 auw2 sshd\[418\]: Invalid user cretin from 188.131.189.12
Dec  1 05:48:49 auw2 sshd\[418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.189.12
Dec  1 05:48:51 auw2 sshd\[418\]: Failed password for invalid user cretin from 188.131.189.12 port 35030 ssh2
Dec  1 05:52:43 auw2 sshd\[749\]: Invalid user scaner from 188.131.189.12
Dec  1 05:52:43 auw2 sshd\[749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.189.12
2019-12-02 00:02:06
159.65.152.201 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.152.201
Failed password for invalid user password from 159.65.152.201 port 60380 ssh2
Invalid user nagako from 159.65.152.201 port 38794
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.152.201
Failed password for invalid user nagako from 159.65.152.201 port 38794 ssh2
2019-12-02 00:30:59
27.128.230.190 attackspambots
Dec  1 16:38:17 OPSO sshd\[13690\]: Invalid user kichiro from 27.128.230.190 port 45940
Dec  1 16:38:17 OPSO sshd\[13690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.230.190
Dec  1 16:38:19 OPSO sshd\[13690\]: Failed password for invalid user kichiro from 27.128.230.190 port 45940 ssh2
Dec  1 16:42:50 OPSO sshd\[14533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.230.190  user=root
Dec  1 16:42:51 OPSO sshd\[14533\]: Failed password for root from 27.128.230.190 port 48340 ssh2
2019-12-02 00:00:22
218.92.0.187 attackspambots
Dec  1 17:15:16 srv206 sshd[7372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187  user=root
Dec  1 17:15:17 srv206 sshd[7372]: Failed password for root from 218.92.0.187 port 15000 ssh2
...
2019-12-02 00:23:03
185.9.147.100 attack
Automatic report - XMLRPC Attack
2019-12-02 00:05:25
200.57.73.170 attackbots
Rude login attack (21 tries in 1d)
2019-12-02 00:34:03
80.20.125.243 attack
2019-12-01T10:37:46.4127561495-001 sshd\[5414\]: Invalid user  from 80.20.125.243 port 58444
2019-12-01T10:37:46.4198961495-001 sshd\[5414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host243-125-static.20-80-b.business.telecomitalia.it
2019-12-01T10:37:48.0679841495-001 sshd\[5414\]: Failed password for invalid user  from 80.20.125.243 port 58444 ssh2
2019-12-01T10:41:25.2895061495-001 sshd\[5549\]: Invalid user itac2010 from 80.20.125.243 port 47441
2019-12-01T10:41:25.2927201495-001 sshd\[5549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host243-125-static.20-80-b.business.telecomitalia.it
2019-12-01T10:41:27.0055971495-001 sshd\[5549\]: Failed password for invalid user itac2010 from 80.20.125.243 port 47441 ssh2
...
2019-12-02 00:08:06
52.32.115.8 attackbotsspam
12/01/2019-17:29:07.265376 52.32.115.8 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-02 00:37:37
222.186.180.41 attackspam
Dec  1 13:41:26 firewall sshd[7662]: Failed password for root from 222.186.180.41 port 42880 ssh2
Dec  1 13:41:39 firewall sshd[7662]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 42880 ssh2 [preauth]
Dec  1 13:41:39 firewall sshd[7662]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-02 00:43:35

Recently Reported IPs

13.57.95.174 104.21.82.122 13.57.81.124 13.57.92.51
13.58.120.94 13.58.168.189 13.58.180.153 13.58.212.2
13.58.243.97 13.58.222.171 13.58.38.147 13.58.48.67
104.21.82.125 13.58.45.39 13.58.68.250 13.59.105.254
13.58.86.204 13.58.157.82 13.59.14.109 13.58.50.11