Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Greenwood

Region: South Carolina

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       198.13.80.0 - 198.13.95.255
CIDR:           198.13.80.0/20
NetName:        WCTEL-NET
NetHandle:      NET-198-13-80-0-1
Parent:         NET198 (NET-198-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   West Carolina Communications, LLC (WCCL-3)
RegDate:        2012-09-10
Updated:        2022-09-30
Ref:            https://rdap.arin.net/registry/ip/198.13.80.0


OrgName:        West Carolina Communications, LLC
OrgId:          WCCL-3
Address:        229 Hwy 28 Bypass
City:           Abbeville
StateProv:      SC
PostalCode:     29620
Country:        US
RegDate:        2012-05-18
Updated:        2026-01-27
Ref:            https://rdap.arin.net/registry/entity/WCCL-3


OrgNOCHandle: ROBIN82-ARIN
OrgNOCName:   Robinson, Jeff 
OrgNOCPhone:  +1-864-446-2111 
OrgNOCEmail:  jeff.robinson@wctel.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ROBIN82-ARIN

OrgTechHandle: TWN1-ARIN
OrgTechName:   Nickles, Thomas W.
OrgTechPhone:  +1-864-446-2111 
OrgTechEmail:  tom.nickles@wctel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TWN1-ARIN

OrgRoutingHandle: TWN1-ARIN
OrgRoutingName:   Nickles, Thomas W.
OrgRoutingPhone:  +1-864-446-2111 
OrgRoutingEmail:  tom.nickles@wctel.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/TWN1-ARIN

OrgNOCHandle: TWN1-ARIN
OrgNOCName:   Nickles, Thomas W.
OrgNOCPhone:  +1-864-446-2111 
OrgNOCEmail:  tom.nickles@wctel.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/TWN1-ARIN

OrgAbuseHandle: ROBIN82-ARIN
OrgAbuseName:   Robinson, Jeff 
OrgAbusePhone:  +1-864-446-2111 
OrgAbuseEmail:  jeff.robinson@wctel.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ROBIN82-ARIN

OrgTechHandle: WCTEL1-ARIN
OrgTechName:   WCTEL-ADMIN
OrgTechPhone:  +1-864-446-2111 
OrgTechEmail:  jeff.robinson@wctel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WCTEL1-ARIN

OrgTechHandle: BED39-ARIN
OrgTechName:   Dean, Brian Edward
OrgTechPhone:  +1-864-323-6963 
OrgTechEmail:  brian.dean@wctel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BED39-ARIN

OrgRoutingHandle: ROUTI68-ARIN
OrgRoutingName:   Routing
OrgRoutingPhone:  +1-864-446-2111 
OrgRoutingEmail:  routing@wctel.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI68-ARIN

OrgNOCHandle: NOC33911-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-864-446-3111 
OrgNOCEmail:  noc@wctel.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC33911-ARIN

OrgTechHandle: ROBIN82-ARIN
OrgTechName:   Robinson, Jeff 
OrgTechPhone:  +1-864-446-2111 
OrgTechEmail:  jeff.robinson@wctel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ROBIN82-ARIN

OrgAbuseHandle: ABUSE9204-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-864-446-2111 
OrgAbuseEmail:  abuse@wctel.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9204-ARIN

OrgDNSHandle: TWN1-ARIN
OrgDNSName:   Nickles, Thomas W.
OrgDNSPhone:  +1-864-446-2111 
OrgDNSEmail:  tom.nickles@wctel.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/TWN1-ARIN

OrgDNSHandle: DNS1120-ARIN
OrgDNSName:   DNS
OrgDNSPhone:  +1-864-446-2111 
OrgDNSEmail:  dns@wctel.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/DNS1120-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.13.88.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.13.88.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 08:06:44 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 213.88.13.198.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 198.13.88.213.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
203.195.243.146 attackspam
Jun 21 12:23:05 localhost sshd\[14865\]: Invalid user shen from 203.195.243.146 port 41764
Jun 21 12:23:05 localhost sshd\[14865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.243.146
Jun 21 12:23:07 localhost sshd\[14865\]: Failed password for invalid user shen from 203.195.243.146 port 41764 ssh2
2019-06-21 18:37:28
103.99.113.89 attackspambots
Jun 21 11:23:24 vps65 sshd\[24819\]: Invalid user test from 103.99.113.89 port 33490
Jun 21 11:23:24 vps65 sshd\[24819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.113.89
...
2019-06-21 18:32:05
117.7.230.120 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:21:50]
2019-06-21 18:39:41
178.128.96.131 attack
" "
2019-06-21 18:53:20
196.52.43.123 attackbots
" "
2019-06-21 18:48:23
113.101.158.7 attackbotsspam
Jun 21 11:20:09 xzibhostname postfix/smtpd[6124]: connect from unknown[113.101.158.7]
Jun 21 11:20:10 xzibhostname postfix/smtpd[6124]: warning: unknown[113.101.158.7]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:20:10 xzibhostname postfix/smtpd[6124]: lost connection after AUTH from unknown[113.101.158.7]
Jun 21 11:20:10 xzibhostname postfix/smtpd[6124]: disconnect from unknown[113.101.158.7]
Jun 21 11:20:11 xzibhostname postfix/smtpd[6570]: connect from unknown[113.101.158.7]
Jun 21 11:20:12 xzibhostname postfix/smtpd[6570]: warning: unknown[113.101.158.7]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:20:12 xzibhostname postfix/smtpd[6570]: lost connection after AUTH from unknown[113.101.158.7]
Jun 21 11:20:12 xzibhostname postfix/smtpd[6570]: disconnect from unknown[113.101.158.7]
Jun 21 11:20:12 xzibhostname postfix/smtpd[6124]: connect from unknown[113.101.158.7]
Jun 21 11:20:13 xzibhostname postfix/smtpd[6124]: warning:........
-------------------------------
2019-06-21 18:37:07
185.155.73.1 attackbots
21 attempts against mh-ssh on flow.magehost.pro
2019-06-21 18:25:26
114.249.219.95 attackbotsspam
Jun 21 11:20:11 myhostname sshd[28965]: Invalid user tun from 114.249.219.95
Jun 21 11:20:11 myhostname sshd[28965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.249.219.95
Jun 21 11:20:13 myhostname sshd[28965]: Failed password for invalid user tun from 114.249.219.95 port 38656 ssh2
Jun 21 11:20:13 myhostname sshd[28965]: Received disconnect from 114.249.219.95 port 38656:11: Bye Bye [preauth]
Jun 21 11:20:13 myhostname sshd[28965]: Disconnected from 114.249.219.95 port 38656 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.249.219.95
2019-06-21 18:37:54
62.210.81.107 attack
62.210.81.107 - - \[21/Jun/2019:11:22:09 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
62.210.81.107 - - \[21/Jun/2019:11:22:09 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
62.210.81.107 - - \[21/Jun/2019:11:22:09 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
62.210.81.107 - - \[21/Jun/2019:11:22:09 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
62.210.81.107 - - \[21/Jun/2019:11:22:10 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
62.210.81.107 - - \[21/Jun/2019:11:22:10 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\)
2019-06-21 18:57:12
177.36.37.116 attack
proto=tcp  .  spt=60815  .  dpt=25  .     (listed on Blocklist de  Jun 20)     (344)
2019-06-21 17:58:07
122.228.19.80 attackbotsspam
scan r
2019-06-21 18:48:58
117.252.66.63 attack
Automatic report - SSH Brute-Force Attack
2019-06-21 18:44:20
216.83.59.4 attackspam
*Port Scan* detected from 216.83.59.4 (US/United States/-). 4 hits in the last 40 seconds
2019-06-21 17:52:44
58.242.83.34 attack
Jun 21 12:28:08 dcd-gentoo sshd[11873]: User root from 58.242.83.34 not allowed because none of user's groups are listed in AllowGroups
Jun 21 12:28:10 dcd-gentoo sshd[11873]: error: PAM: Authentication failure for illegal user root from 58.242.83.34
Jun 21 12:28:08 dcd-gentoo sshd[11873]: User root from 58.242.83.34 not allowed because none of user's groups are listed in AllowGroups
Jun 21 12:28:10 dcd-gentoo sshd[11873]: error: PAM: Authentication failure for illegal user root from 58.242.83.34
Jun 21 12:28:08 dcd-gentoo sshd[11873]: User root from 58.242.83.34 not allowed because none of user's groups are listed in AllowGroups
Jun 21 12:28:10 dcd-gentoo sshd[11873]: error: PAM: Authentication failure for illegal user root from 58.242.83.34
Jun 21 12:28:10 dcd-gentoo sshd[11873]: Failed keyboard-interactive/pam for invalid user root from 58.242.83.34 port 46081 ssh2
...
2019-06-21 18:43:31
91.179.35.177 attackspambots
20 attempts against mh-ssh on dawn.magehost.pro
2019-06-21 18:27:17

Recently Reported IPs

2606:4700:10::6816:438 160.198.77.165 113.164.79.110 108.243.126.82
94.248.128.97 172.239.105.38 2606:4700:10::ac43:1994 2606:4700:10::6814:7757
2606:4700:10::ac43:2066 2606:4700:10::6816:1760 2606:4700:10::6816:3604 2606:4700:10::6814:7741
2606:4700:10::6814:5811 2606:4700:10::6816:415d 110.78.153.111 91.231.89.64
91.231.89.198 64.227.128.117 178.6.110.249 47.128.122.99