Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.147.42.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.147.42.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 16:21:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.42.147.239.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.42.147.239.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.189.154.66 attack
(sshd) Failed SSH login from 89.189.154.66 (RU/Russia/89.189.154.66.dynamic.ufanet.ru): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 14 16:15:17 andromeda sshd[30783]: Invalid user test from 89.189.154.66 port 42724
Jan 14 16:15:19 andromeda sshd[30783]: Failed password for invalid user test from 89.189.154.66 port 42724 ssh2
Jan 14 16:16:12 andromeda sshd[30926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.154.66  user=www-data
2020-01-15 01:02:09
112.255.14.217 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-15 01:23:17
89.248.168.202 attackbots
01/14/2020-18:01:53.444596 89.248.168.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-15 01:12:05
80.131.20.147 attack
Jan 14 08:19:02 ny01 sshd[25747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.131.20.147
Jan 14 08:19:03 ny01 sshd[25747]: Failed password for invalid user oracle from 80.131.20.147 port 55252 ssh2
Jan 14 08:27:41 ny01 sshd[27058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.131.20.147
2020-01-15 01:13:32
198.100.146.132 attackspam
Automatic report - XMLRPC Attack
2020-01-15 01:08:00
95.85.70.224 attack
14.057.845,01-03/02 [bc18/m73] PostRequest-Spammer scoring: maputo01_x2b
2020-01-15 00:56:28
115.68.220.10 attackspam
Jan 14 16:00:37 localhost sshd\[3037\]: Invalid user gao from 115.68.220.10 port 44948
Jan 14 16:00:37 localhost sshd\[3037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.220.10
Jan 14 16:00:40 localhost sshd\[3037\]: Failed password for invalid user gao from 115.68.220.10 port 44948 ssh2
...
2020-01-15 01:12:38
14.177.234.227 attackspambots
Unauthorized connection attempt detected from IP address 14.177.234.227 to port 2220 [J]
2020-01-15 00:53:37
117.252.67.188 attackspam
Jan 14 14:00:23 mail postfix/smtpd\[23530\]: warning: unknown\[117.252.67.188\]: SASL PLAIN authentication failed: Connection lost to authentication server
Jan 14 14:00:39 mail postfix/smtpd\[22952\]: warning: unknown\[117.252.67.188\]: SASL PLAIN authentication failed: Connection lost to authentication server
Jan 14 14:00:51 mail postfix/smtpd\[23752\]: warning: unknown\[117.252.67.188\]: SASL PLAIN authentication failed: Connection lost to authentication server
2020-01-15 01:24:00
209.250.246.11 attackspam
Jan 14 20:03:53 lcl-usvr-02 sshd[1665]: Invalid user public from 209.250.246.11 port 51703
Jan 14 20:03:53 lcl-usvr-02 sshd[1665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.250.246.11
Jan 14 20:03:53 lcl-usvr-02 sshd[1665]: Invalid user public from 209.250.246.11 port 51703
Jan 14 20:03:56 lcl-usvr-02 sshd[1665]: Failed password for invalid user public from 209.250.246.11 port 51703 ssh2
Jan 14 20:06:18 lcl-usvr-02 sshd[2187]: Invalid user ftpuser2 from 209.250.246.11 port 37092
...
2020-01-15 00:59:53
61.145.169.154 attackspam
FTP brute-force attack
2020-01-15 01:16:31
36.69.81.255 attackspam
Unauthorized connection attempt from IP address 36.69.81.255 on Port 445(SMB)
2020-01-15 01:00:45
91.98.98.2 attack
1579006854 - 01/14/2020 14:00:54 Host: 91.98.98.2/91.98.98.2 Port: 445 TCP Blocked
2020-01-15 01:21:14
110.137.224.171 attack
Unauthorized connection attempt from IP address 110.137.224.171 on Port 445(SMB)
2020-01-15 01:13:14
51.91.102.173 attack
Jan 14 01:35:10 server sshd\[8736\]: Failed password for invalid user postgres from 51.91.102.173 port 58846 ssh2
Jan 14 20:02:29 server sshd\[1564\]: Invalid user midgear from 51.91.102.173
Jan 14 20:02:29 server sshd\[1564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-51-91-102.eu 
Jan 14 20:02:31 server sshd\[1564\]: Failed password for invalid user midgear from 51.91.102.173 port 52430 ssh2
Jan 14 20:03:17 server sshd\[1692\]: Invalid user postgres from 51.91.102.173
...
2020-01-15 01:19:14

Recently Reported IPs

60.130.100.254 150.10.175.149 81.108.103.85 191.21.118.77
248.212.194.72 251.224.121.172 235.201.159.30 160.87.85.95
9.79.46.68 212.37.207.168 187.167.103.171 77.225.2.26
120.181.76.51 205.95.145.254 193.154.115.229 186.195.222.162
99.77.198.95 89.217.136.168 120.55.235.194 116.1.195.176