Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.99.147.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6650
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.99.147.242.			IN	A

;; AUTHORITY SECTION:
.			257	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 06:09:05 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 242.147.99.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.147.99.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.66.243.77 attack
2020-01-11 20:27:14,816 fail2ban.actions: WARNING [ssh] Ban 117.66.243.77
2020-01-12 04:59:50
14.170.170.26 attackbots
Honeypot attack, port: 81, PTR: static.vnpt.vn.
2020-01-12 05:26:30
91.143.167.153 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 05:27:33
45.74.234.82 attackbots
Honeypot attack, port: 5555, PTR: broadband-user.acndigital.net.
2020-01-12 05:14:01
81.241.235.191 attackspambots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-01-12 04:56:14
117.80.212.113 attackbotsspam
$f2bV_matches
2020-01-12 04:59:00
176.113.209.93 attack
Honeypot attack, port: 5555, PTR: 93-209-113-176.extratel.net.ua.
2020-01-12 05:08:42
118.126.112.116 attackbots
$f2bV_matches
2020-01-12 04:57:28
117.50.46.36 attackbots
$f2bV_matches
2020-01-12 05:03:34
213.131.52.226 attackbots
Honeypot attack, port: 445, PTR: host-213-131-52-226-customer.wanex.net.
2020-01-12 05:09:29
180.246.38.94 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 05:32:23
117.48.212.113 attack
$f2bV_matches
2020-01-12 05:05:07
182.61.136.53 attack
Nov  1 00:28:18 vtv3 sshd[26375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.136.53  user=root
Nov  1 00:28:19 vtv3 sshd[26375]: Failed password for root from 182.61.136.53 port 44064 ssh2
Nov  1 00:32:36 vtv3 sshd[28599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.136.53  user=root
Nov  1 00:45:43 vtv3 sshd[2875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.136.53  user=root
Nov  1 00:45:45 vtv3 sshd[2875]: Failed password for root from 182.61.136.53 port 49790 ssh2
Nov  1 00:50:29 vtv3 sshd[5531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.136.53  user=root
Nov  1 00:50:31 vtv3 sshd[5531]: Failed password for root from 182.61.136.53 port 58262 ssh2
Nov  1 00:55:32 vtv3 sshd[8111]: Invalid user temp from 182.61.136.53 port 38544
Nov  1 00:55:32 vtv3 sshd[8111]: pam_unix(sshd:auth): authentication failure;
2020-01-12 05:33:09
206.81.7.42 attack
SSH Bruteforce attempt
2020-01-12 05:30:47
117.54.13.216 attack
$f2bV_matches
2020-01-12 05:01:02

Recently Reported IPs

28.38.85.145 69.197.247.49 187.60.69.238 41.201.130.200
126.100.96.135 93.44.53.175 20.206.117.206 27.184.31.147
202.211.231.132 130.148.246.198 168.52.77.58 25.241.137.43
189.183.41.206 202.148.28.102 64.83.61.226 178.5.238.119
244.160.72.36 185.131.61.114 130.222.114.71 115.188.15.206