Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.72.4.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.72.4.242.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 22:16:45 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 242.4.72.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.4.72.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.186.57.150 attackbotsspam
(sshd) Failed SSH login from 1.186.57.150 (IN/India/1.186.57.150.dvois.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 24 17:04:25 amsweb01 sshd[16796]: Invalid user user from 1.186.57.150 port 47208
Apr 24 17:04:26 amsweb01 sshd[16796]: Failed password for invalid user user from 1.186.57.150 port 47208 ssh2
Apr 24 17:12:00 amsweb01 sshd[17609]: Invalid user karol from 1.186.57.150 port 45602
Apr 24 17:12:01 amsweb01 sshd[17609]: Failed password for invalid user karol from 1.186.57.150 port 45602 ssh2
Apr 24 17:16:35 amsweb01 sshd[19733]: Invalid user fery from 1.186.57.150 port 33622
2020-04-24 23:30:34
106.225.211.193 attack
Apr 24 14:02:32 dev0-dcde-rnet sshd[7987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.225.211.193
Apr 24 14:02:34 dev0-dcde-rnet sshd[7987]: Failed password for invalid user dms from 106.225.211.193 port 36469 ssh2
Apr 24 14:05:59 dev0-dcde-rnet sshd[8070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.225.211.193
2020-04-24 23:36:24
115.146.126.209 attackspam
Apr 24 15:48:35 jane sshd[7822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.126.209 
Apr 24 15:48:37 jane sshd[7822]: Failed password for invalid user office from 115.146.126.209 port 52536 ssh2
...
2020-04-24 23:47:20
178.176.175.97 attack
Brute force attempt
2020-04-24 23:27:47
188.166.237.191 attackspambots
Apr 24 14:28:16 plex sshd[21458]: Invalid user share from 188.166.237.191 port 54090
2020-04-24 23:29:39
129.211.30.94 attackbots
Apr 24 14:05:46  sshd\[32312\]: Invalid user gatt from 129.211.30.94Apr 24 14:05:48  sshd\[32312\]: Failed password for invalid user gatt from 129.211.30.94 port 55520 ssh2
...
2020-04-24 23:42:43
123.16.29.57 attackbots
DATE:2020-04-24 14:05:53, IP:123.16.29.57, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-04-24 23:41:25
31.40.214.200 attack
Apr 24 16:03:28 pornomens sshd\[20509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.40.214.200  user=root
Apr 24 16:03:30 pornomens sshd\[20509\]: Failed password for root from 31.40.214.200 port 41406 ssh2
Apr 24 16:07:45 pornomens sshd\[20544\]: Invalid user piotr from 31.40.214.200 port 57042
Apr 24 16:07:45 pornomens sshd\[20544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.40.214.200
...
2020-04-24 23:41:50
134.209.198.245 attack
Lines containing failures of 134.209.198.245 (max 1000)
Apr 24 00:14:28 ks3373544 sshd[31336]: Did not receive identification string from 134.209.198.245 port 49702
Apr 24 00:14:34 ks3373544 sshd[31385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.198.245  user=r.r
Apr 24 00:14:35 ks3373544 sshd[31385]: Failed password for r.r from 134.209.198.245 port 44202 ssh2
Apr 24 00:14:35 ks3373544 sshd[31385]: Received disconnect from 134.209.198.245 port 44202:11: Normal Shutdown, Thank you for playing [preauth]
Apr 24 00:14:35 ks3373544 sshd[31385]: Disconnected from 134.209.198.245 port 44202 [preauth]
Apr 24 00:14:45 ks3373544 sshd[31456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.198.245  user=r.r
Apr 24 00:14:46 ks3373544 sshd[31456]: Failed password for r.r from 134.209.198.245 port 44832 ssh2
Apr 24 00:14:46 ks3373544 sshd[31456]: Received disconnect from 134.209.198.........
------------------------------
2020-04-24 23:54:05
95.163.84.133 attack
RDP brute forcing (r)
2020-04-25 00:02:21
106.12.215.244 attackspambots
Apr 24 16:12:44 santamaria sshd\[24130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.244  user=root
Apr 24 16:12:46 santamaria sshd\[24130\]: Failed password for root from 106.12.215.244 port 50752 ssh2
Apr 24 16:16:33 santamaria sshd\[24163\]: Invalid user uq from 106.12.215.244
Apr 24 16:16:33 santamaria sshd\[24163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.244
...
2020-04-25 00:06:50
80.241.248.206 attack
1587729926 - 04/24/2020 14:05:26 Host: 80.241.248.206/80.241.248.206 Port: 445 TCP Blocked
2020-04-24 23:59:00
51.91.103.33 attack
$f2bV_matches
2020-04-25 00:05:02
103.145.12.87 attackspam
[2020-04-24 11:31:02] NOTICE[1170][C-00004af9] chan_sip.c: Call from '' (103.145.12.87:52634) to extension '011441482455983' rejected because extension not found in context 'public'.
[2020-04-24 11:31:02] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-24T11:31:02.223-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441482455983",SessionID="0x7f6c083c7058",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.87/52634",ACLName="no_extension_match"
[2020-04-24 11:31:02] NOTICE[1170][C-00004afa] chan_sip.c: Call from '' (103.145.12.87:56500) to extension '011442037698349' rejected because extension not found in context 'public'.
[2020-04-24 11:31:02] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-24T11:31:02.833-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037698349",SessionID="0x7f6c08378858",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-04-24 23:45:37
2a04:84c1:0:4f::2 attackspambots
xmlrpc attack
2020-04-24 23:26:41

Recently Reported IPs

165.98.46.130 73.46.94.114 78.217.200.39 135.60.66.63
69.14.82.216 203.147.87.57 166.189.95.77 125.117.242.244
34.166.65.240 48.16.108.198 97.10.99.193 175.230.182.100
226.10.130.19 184.38.216.191 243.184.87.57 70.99.105.93
230.212.18.24 162.125.65.13 223.50.73.135 129.177.38.119