Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.104.55.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;243.104.55.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:44:55 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.55.104.243.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.55.104.243.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.117.41.21 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 12:51:08,878 INFO [shellcode_manager] (200.117.41.21) no match, writing hexdump (923e2dbac8b4614f51087f185f8ced35 :2257083) - MS17010 (EternalBlue)
2019-07-09 12:14:03
147.135.207.193 attackspam
[munged]::443 147.135.207.193 - - [09/Jul/2019:00:51:09 +0200] "POST /[munged]: HTTP/1.1" 200 6318 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 147.135.207.193 - - [09/Jul/2019:00:51:10 +0200] "POST /[munged]: HTTP/1.1" 200 6320 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 147.135.207.193 - - [09/Jul/2019:00:51:10 +0200] "POST /[munged]: HTTP/1.1" 200 6320 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-09 11:33:03
102.165.39.56 attack
\[2019-07-08 16:55:49\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-08T16:55:49.247-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441274066078",SessionID="0x7f02f85da9d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.39.56/60800",ACLName="no_extension_match"
\[2019-07-08 16:55:57\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-08T16:55:57.741-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441134900374",SessionID="0x7f02f88cef08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.39.56/62313",ACLName="no_extension_match"
\[2019-07-08 16:55:58\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-08T16:55:58.214-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441902933938",SessionID="0x7f02f867ac88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.39.56/63260",ACLName="no_ext
2019-07-09 11:38:45
153.36.232.36 attackspam
SSH Brute Force, server-1 sshd[21687]: Failed password for root from 153.36.232.36 port 43705 ssh2
2019-07-09 12:27:04
105.235.116.254 attack
Jul  9 06:01:39 amit sshd\[20659\]: Invalid user aksel from 105.235.116.254
Jul  9 06:01:39 amit sshd\[20659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.235.116.254
Jul  9 06:01:41 amit sshd\[20659\]: Failed password for invalid user aksel from 105.235.116.254 port 39836 ssh2
...
2019-07-09 12:01:57
192.169.202.119 attackbots
Automatic report - Web App Attack
2019-07-09 11:54:42
14.173.210.156 attackbots
Unauthorized connection attempt from IP address 14.173.210.156 on Port 445(SMB)
2019-07-09 12:20:58
45.82.153.5 attack
Jul  9 01:52:29 box kernel: [744573.506894] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=60881 PROTO=TCP SPT=47835 DPT=4752 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 02:10:19 box kernel: [745643.543673] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3511 PROTO=TCP SPT=47835 DPT=4755 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 04:10:51 box kernel: [752875.178727] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=37075 PROTO=TCP SPT=47835 DPT=4754 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 05:17:37 box kernel: [756881.128585] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57746 PROTO=TCP SPT=47835 DPT=4757 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 05:33:21 box kernel: [757825.398355] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=29065 PROTO=
2019-07-09 12:17:25
222.212.136.220 attack
Jul  8 10:31:06 jonas sshd[18601]: Invalid user admin2 from 222.212.136.220
Jul  8 10:31:06 jonas sshd[18601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.212.136.220
Jul  8 10:31:09 jonas sshd[18601]: Failed password for invalid user admin2 from 222.212.136.220 port 24485 ssh2
Jul  8 10:31:09 jonas sshd[18601]: Received disconnect from 222.212.136.220 port 24485:11: Bye Bye [preauth]
Jul  8 10:31:09 jonas sshd[18601]: Disconnected from 222.212.136.220 port 24485 [preauth]
Jul  8 10:40:42 jonas sshd[19114]: Connection closed by 222.212.136.220 port 25933 [preauth]
Jul  8 10:45:14 jonas sshd[19424]: Invalid user test from 222.212.136.220
Jul  8 10:45:14 jonas sshd[19424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.212.136.220
Jul  8 10:45:16 jonas sshd[19424]: Failed password for invalid user test from 222.212.136.220 port 26981 ssh2
Jul  8 10:45:16 jonas sshd[19424]: Receive........
-------------------------------
2019-07-09 11:28:29
35.232.138.200 attackspambots
Jul  9 02:28:34 xb3 sshd[27226]: Failed password for invalid user r.r1 from 35.232.138.200 port 38400 ssh2
Jul  9 02:28:34 xb3 sshd[27226]: Received disconnect from 35.232.138.200: 11: Bye Bye [preauth]
Jul  9 02:32:13 xb3 sshd[22941]: Failed password for invalid user thiago from 35.232.138.200 port 56502 ssh2
Jul  9 02:32:14 xb3 sshd[22941]: Received disconnect from 35.232.138.200: 11: Bye Bye [preauth]
Jul  9 02:35:27 xb3 sshd[14730]: Connection closed by 35.232.138.200 [preauth]
Jul  9 02:38:34 xb3 sshd[24318]: Failed password for invalid user wescott from 35.232.138.200 port 33104 ssh2
Jul  9 02:38:34 xb3 sshd[24318]: Received disconnect from 35.232.138.200: 11: Bye Bye [preauth]
Jul  9 02:41:40 xb3 sshd[17714]: Failed password for invalid user babu from 35.232.138.200 port 49636 ssh2
Jul  9 02:41:41 xb3 sshd[17714]: Received disconnect from 35.232.138.200: 11: Bye Bye [preauth]
Jul  9 02:44:56 xb3 sshd[25480]: Failed password for invalid user owner from 35.232.138.........
-------------------------------
2019-07-09 11:32:08
138.121.161.198 attack
Jul  9 04:34:18 MainVPS sshd[9527]: Invalid user tomcat from 138.121.161.198 port 53708
Jul  9 04:34:18 MainVPS sshd[9527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.161.198
Jul  9 04:34:18 MainVPS sshd[9527]: Invalid user tomcat from 138.121.161.198 port 53708
Jul  9 04:34:19 MainVPS sshd[9527]: Failed password for invalid user tomcat from 138.121.161.198 port 53708 ssh2
Jul  9 04:38:51 MainVPS sshd[9885]: Invalid user brix from 138.121.161.198 port 44760
...
2019-07-09 11:35:42
85.128.142.36 attackbotsspam
xmlrpc attack
2019-07-09 11:28:50
5.62.138.101 attackbots
Jul  8 21:34:45 mail postfix/postscreen[18767]: PREGREET 20 after 0.75 from [5.62.138.101]:60676: HELO tuyvqalii.com

...
2019-07-09 11:40:50
118.70.170.177 attackbots
Unauthorized connection attempt from IP address 118.70.170.177 on Port 445(SMB)
2019-07-09 12:25:05
112.85.42.182 attack
Jul  9 02:58:41 nextcloud sshd\[22252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
Jul  9 02:58:43 nextcloud sshd\[22252\]: Failed password for root from 112.85.42.182 port 65397 ssh2
Jul  9 02:58:54 nextcloud sshd\[22252\]: Failed password for root from 112.85.42.182 port 65397 ssh2
...
2019-07-09 11:30:42

Recently Reported IPs

115.131.100.118 30.149.88.161 83.83.160.75 57.197.102.98
234.190.105.96 133.212.196.94 146.43.208.158 224.148.130.172
67.227.28.99 188.248.246.175 104.101.68.202 30.121.146.149
250.122.242.111 30.121.73.0 12.190.168.133 225.184.204.159
62.106.77.142 240.79.54.190 242.38.23.176 197.36.216.163