Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.31.149.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;240.31.149.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:14:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.149.31.240.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.149.31.240.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.161.24.8 attack
Unauthorized connection attempt from IP address 113.161.24.8 on Port 445(SMB)
2020-08-14 19:58:58
114.35.61.252 attackspambots
 TCP (SYN) 114.35.61.252:18243 -> port 80, len 44
2020-08-14 19:38:56
164.132.46.197 attackbotsspam
Aug 14 13:34:48 abendstille sshd\[14373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197  user=root
Aug 14 13:34:50 abendstille sshd\[14373\]: Failed password for root from 164.132.46.197 port 34762 ssh2
Aug 14 13:39:44 abendstille sshd\[18861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197  user=root
Aug 14 13:39:46 abendstille sshd\[18861\]: Failed password for root from 164.132.46.197 port 45778 ssh2
Aug 14 13:44:31 abendstille sshd\[23029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197  user=root
...
2020-08-14 20:04:46
85.138.105.54 attack
Unauthorized connection attempt from IP address 85.138.105.54 on Port 445(SMB)
2020-08-14 19:44:52
183.138.142.139 attackbots
 TCP (SYN) 183.138.142.139:60636 -> port 8080, len 40
2020-08-14 20:13:56
171.224.177.150 attackbotsspam
445/tcp
[2020-08-14]1pkt
2020-08-14 20:07:04
36.75.95.40 attackbotsspam
Unauthorized connection attempt from IP address 36.75.95.40 on Port 445(SMB)
2020-08-14 20:22:26
114.5.214.108 attackbotsspam
445/tcp
[2020-08-14]1pkt
2020-08-14 19:46:28
94.25.169.70 attackbotsspam
445/tcp
[2020-08-14]1pkt
2020-08-14 20:12:07
106.12.3.28 attackbotsspam
$f2bV_matches
2020-08-14 19:37:31
90.150.205.99 attack
23/tcp
[2020-08-14]1pkt
2020-08-14 19:57:03
45.188.227.139 attackbots
Brute forcing email accounts
2020-08-14 19:45:11
117.4.149.103 attack
Unauthorized connection attempt from IP address 117.4.149.103 on Port 445(SMB)
2020-08-14 20:18:43
103.16.168.226 attackbotsspam
Unauthorized connection attempt from IP address 103.16.168.226 on Port 445(SMB)
2020-08-14 19:43:21
207.188.84.69 attackspam
RDP Brute Force attempts
2020-08-14 20:10:55

Recently Reported IPs

201.148.231.126 210.122.103.98 26.154.41.191 55.158.147.53
142.11.167.148 65.177.52.160 228.183.20.39 163.135.244.144
151.47.106.14 233.177.108.53 130.37.180.153 124.41.12.106
231.144.97.228 182.19.154.179 49.251.248.108 75.90.37.7
44.121.30.16 25.195.229.12 34.184.153.144 74.199.194.45