Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.48.13.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.48.13.22.			IN	A

;; AUTHORITY SECTION:
.			96	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101300 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 14 00:53:52 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 22.13.48.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.13.48.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.40 attackspam
firewall-block, port(s): 58916/tcp
2020-08-13 17:18:33
206.126.81.102 attackbots
sshd: Failed password for .... from 206.126.81.102 port 57858 ssh2 (4 attempts)
2020-08-13 17:06:13
195.162.81.89 attackspambots
Port scanning [2 denied]
2020-08-13 16:53:53
222.186.180.8 attack
Aug 13 11:23:23 ns381471 sshd[21261]: Failed password for root from 222.186.180.8 port 10814 ssh2
Aug 13 11:23:37 ns381471 sshd[21261]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 10814 ssh2 [preauth]
2020-08-13 17:26:33
185.176.27.190 attackbotsspam
firewall-block, port(s): 9386/tcp, 64690/tcp
2020-08-13 17:23:48
5.188.84.207 attackbots
tried to spam in our blog comments: Привет всем! 
 Нашел удивительную фотосессию на этом сайте:  url_detected:limonos dot ru : 
url_detected:limonos dot ru/9753-sibirskie-kanikuly-vladimira-putina.html  Сибирские каникулы Владимира Путина  
url_detected:limonos dot ru/963-samaya-izyskannaya-kuhnya-mira.html 
красивые девушки дня url_detected:limonos dot ru/krasivye_devushki/
2020-08-13 17:10:07
60.167.182.157 attackspam
Aug 13 05:20:39 ns382633 sshd\[20084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.157  user=root
Aug 13 05:20:41 ns382633 sshd\[20084\]: Failed password for root from 60.167.182.157 port 42290 ssh2
Aug 13 05:37:00 ns382633 sshd\[23093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.157  user=root
Aug 13 05:37:01 ns382633 sshd\[23093\]: Failed password for root from 60.167.182.157 port 47658 ssh2
Aug 13 05:50:29 ns382633 sshd\[25497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.157  user=root
2020-08-13 17:14:15
50.237.128.182 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 9530 proto: tcp cat: Misc Attackbytes: 60
2020-08-13 17:31:39
111.229.196.130 attackspambots
$f2bV_matches
2020-08-13 17:20:59
92.222.74.255 attackspambots
$f2bV_matches
2020-08-13 17:08:42
222.239.124.19 attackbots
sshd: Failed password for .... from 222.239.124.19 port 38052 ssh2 (12 attempts)
2020-08-13 17:21:29
122.51.230.155 attack
(sshd) Failed SSH login from 122.51.230.155 (CN/China/-): 5 in the last 3600 secs
2020-08-13 17:01:06
205.185.117.149 attackbots
Automatic report - Banned IP Access
2020-08-13 17:20:28
91.229.112.17 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-13 17:06:39
201.55.142.31 attackbotsspam
"SMTP brute force auth login attempt."
2020-08-13 17:32:34

Recently Reported IPs

128.90.52.173 36.35.21.229 213.210.45.8 139.16.23.86
25.122.129.75 160.66.66.24 65.140.223.144 34.174.233.194
168.228.2.254 142.125.200.128 25.213.94.192 104.110.158.117
117.205.62.29 36.15.125.217 73.171.194.70 250.74.178.175
160.58.24.189 172.32.160.59 214.243.16.203 170.234.170.11