Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dublin

Region: Leinster

Country: Ireland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       13.64.0.0 - 13.107.255.255
CIDR:           13.64.0.0/11, 13.96.0.0/13, 13.104.0.0/14
NetName:        MSFT
NetHandle:      NET-13-64-0-0-1
Parent:         NET13 (NET-13-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Microsoft Corporation (MSFT)
RegDate:        2015-03-26
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/13.64.0.0



OrgName:        Microsoft Corporation
OrgId:          MSFT
Address:        One Microsoft Way
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        1998-07-10
Updated:        2025-06-10
Comment:        To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment:        * https://cert.microsoft.com.  
Comment:        
Comment:        For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment:        * abuse@microsoft.com.  
Comment:        
Comment:        To report security vulnerabilities in Microsoft products and services, please contact:
Comment:        * secure@microsoft.com.  
Comment:        
Comment:        For legal and law enforcement-related requests, please contact:
Comment:        * msndcc@microsoft.com
Comment:        
Comment:        For routing, peering or DNS issues, please 
Comment:        contact:
Comment:        * IOC@microsoft.com
Ref:            https://rdap.arin.net/registry/entity/MSFT


OrgTechHandle: MRPD-ARIN
OrgTechName:   Microsoft Routing, Peering, and DNS
OrgTechPhone:  +1-425-882-8080 
OrgTechEmail:  IOC@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MRPD-ARIN

OrgTechHandle: SINGH683-ARIN
OrgTechName:   Singh, Prachi 
OrgTechPhone:  +1-425-707-5601 
OrgTechEmail:  pracsin@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SINGH683-ARIN

OrgTechHandle: IPHOS5-ARIN
OrgTechName:   IPHostmaster, IPHostmaster 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  iphostmaster@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPHOS5-ARIN

OrgTechHandle: BEDAR6-ARIN
OrgTechName:   Bedard, Dawn 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  dabedard@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BEDAR6-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName:   Microsoft Abuse Contact
OrgAbusePhone:  +1-425-882-8080 
OrgAbuseEmail:  abuse@microsoft.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MAC74-ARIN

OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName:   Chaturmohta, Somesh 
OrgRoutingPhone:  +1-425-882-8080 
OrgRoutingEmail:  someshch@microsoft.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CHATU3-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.79.87.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.79.87.25.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012600 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 26 20:00:02 CST 2026
;; MSG SIZE  rcvd: 104
Host info
Host 25.87.79.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 25.87.79.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
199.249.230.84 attackbotsspam
2019-07-03T09:15:25.702120WS-Zach sshd[11475]: User root from 199.249.230.84 not allowed because none of user's groups are listed in AllowGroups
2019-07-03T09:15:25.714039WS-Zach sshd[11475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.84  user=root
2019-07-03T09:15:25.702120WS-Zach sshd[11475]: User root from 199.249.230.84 not allowed because none of user's groups are listed in AllowGroups
2019-07-03T09:15:27.670832WS-Zach sshd[11475]: Failed password for invalid user root from 199.249.230.84 port 48978 ssh2
2019-07-03T09:15:25.714039WS-Zach sshd[11475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.84  user=root
2019-07-03T09:15:25.702120WS-Zach sshd[11475]: User root from 199.249.230.84 not allowed because none of user's groups are listed in AllowGroups
2019-07-03T09:15:27.670832WS-Zach sshd[11475]: Failed password for invalid user root from 199.249.230.84 port 48978 ssh2
2019-07-03T09:15:31.46107
2019-07-04 04:06:15
102.165.35.114 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-04 04:07:01
41.39.97.117 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 13:10:42,320 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.39.97.117)
2019-07-04 03:43:35
103.207.38.154 attackspambots
Rude login attack (8 tries in 1d)
2019-07-04 03:57:57
122.93.235.10 attackbotsspam
Jul  4 00:45:41 tanzim-HP-Z238-Microtower-Workstation sshd\[2792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.93.235.10  user=root
Jul  4 00:45:43 tanzim-HP-Z238-Microtower-Workstation sshd\[2792\]: Failed password for root from 122.93.235.10 port 65084 ssh2
Jul  4 00:45:57 tanzim-HP-Z238-Microtower-Workstation sshd\[2836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.93.235.10  user=root
...
2019-07-04 03:35:58
159.203.65.205 attack
53413/udp 53413/udp 53413/udp...
[2019-06-26/07-03]7pkt,1pt.(udp)
2019-07-04 03:44:38
85.26.233.92 attackspam
Autoban   85.26.233.92 AUTH/CONNECT
2019-07-04 03:33:08
122.233.98.137 attack
FTP/21 MH Probe, BF, Hack -
2019-07-04 03:48:39
61.19.72.146 attackbots
Rude login attack (3 tries in 1d)
2019-07-04 03:40:24
36.67.155.171 attackspam
5900/tcp 5900/tcp
[2019-06-27/07-03]2pkt
2019-07-04 03:58:17
106.51.5.17 attack
445/tcp 445/tcp
[2019-05-11/07-03]2pkt
2019-07-04 03:56:56
171.244.9.26 attackbotsspam
SMB Server BruteForce Attack
2019-07-04 04:05:22
88.248.113.47 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 15:33:49,548 INFO [amun_request_handler] PortScan Detected on Port: 445 (88.248.113.47)
2019-07-04 03:45:45
189.152.182.158 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 13:11:29,060 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.152.182.158)
2019-07-04 03:37:12
116.113.99.173 attack
5555/tcp 5555/tcp
[2019-06-18/07-03]2pkt
2019-07-04 03:37:42

Recently Reported IPs

14.220.182.154 173.82.226.18 142.171.201.207 34.52.153.230
188.253.124.73 1.234.44.150 183.192.195.199 39.156.130.185
137.220.227.243 209.85.128.177 44.220.185.58 192.168.0.64
194.88.135.172 106.8.72.230 193.143.1.53 185.247.137.78
157.245.198.187 101.68.50.9 130.94.203.238 66.249.76.233