Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 238.245.48.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;238.245.48.13.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 08:42:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.48.245.238.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.48.245.238.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.243.91.19 attackspam
$f2bV_matches
2020-03-10 00:43:12
204.93.169.27 attackspambots
Automatic report - WordPress Brute Force
2020-03-10 00:40:06
222.186.175.169 attackbotsspam
Mar  9 17:45:37 jane sshd[16725]: Failed password for root from 222.186.175.169 port 7198 ssh2
Mar  9 17:45:42 jane sshd[16725]: Failed password for root from 222.186.175.169 port 7198 ssh2
...
2020-03-10 00:50:24
66.70.160.187 attackbots
GET /wp-login.php
2020-03-10 01:02:01
196.0.51.20 attackbotsspam
Email rejected due to spam filtering
2020-03-10 00:58:58
1.186.57.150 attackspam
Mar  9 09:55:02 ws19vmsma01 sshd[168784]: Failed password for root from 1.186.57.150 port 58034 ssh2
...
2020-03-10 00:59:26
167.73.69.166 attackspam
Scan detected and blocked 2020.03.09 13:27:26
2020-03-10 01:06:29
111.229.158.180 attackspam
Mar  9 15:44:13 srv01 sshd[17456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.158.180  user=r.r
Mar  9 15:44:14 srv01 sshd[17456]: Failed password for r.r from 111.229.158.180 port 41330 ssh2
Mar  9 15:48:40 srv01 sshd[17788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.158.180  user=r.r
Mar  9 15:48:42 srv01 sshd[17788]: Failed password for r.r from 111.229.158.180 port 57332 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.229.158.180
2020-03-10 00:57:10
14.138.181.42 attack
" "
2020-03-10 00:35:32
167.95.139.172 attackspambots
Scan detected and blocked 2020.03.09 13:27:26
2020-03-10 01:06:06
180.248.121.171 attackbotsspam
Email rejected due to spam filtering
2020-03-10 00:41:23
144.22.98.225 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-10 01:03:17
115.218.19.149 attack
23/tcp
[2020-03-09]1pkt
2020-03-10 00:53:24
96.114.71.147 attack
Mar  9 12:58:21 ws19vmsma01 sshd[107803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147
Mar  9 12:58:23 ws19vmsma01 sshd[107803]: Failed password for invalid user redmine from 96.114.71.147 port 48586 ssh2
...
2020-03-10 01:08:59
103.244.176.23 attackspam
Wordpress Admin Login attack
2020-03-10 00:39:10

Recently Reported IPs

161.245.80.242 233.224.138.55 242.73.149.182 74.217.230.160
81.94.203.179 243.85.230.85 161.246.42.14 46.186.171.59
145.215.66.205 220.239.247.132 24.25.41.106 49.0.30.49
200.100.210.60 151.105.197.114 182.199.68.95 39.195.86.255
177.113.168.35 70.110.8.165 146.245.255.2 86.168.215.97