Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.223.136.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;243.223.136.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 05:44:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 13.136.223.243.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.136.223.243.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.118 attackspam
08/06/2019-18:14:05.007919 185.176.27.118 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-07 06:31:57
118.191.216.250 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 20:14:20,074 INFO [amun_request_handler] PortScan Detected on Port: 445 (118.191.216.250)
2019-08-07 06:28:15
103.66.79.245 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 21:12:46,224 INFO [shellcode_manager] (103.66.79.245) no match, writing hexdump (cc4271b64fe06edccba4149eb014dc29 :1881051) - MS17010 (EternalBlue)
2019-08-07 05:54:47
61.227.243.214 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 20:12:52,883 INFO [amun_request_handler] PortScan Detected on Port: 445 (61.227.243.214)
2019-08-07 06:37:31
47.188.154.94 attackspam
2019-08-06T21:50:13.422640abusebot-8.cloudsearch.cf sshd\[7810\]: Invalid user maja from 47.188.154.94 port 57345
2019-08-07 06:16:32
209.212.62.151 attackbots
Automatic report - Port Scan Attack
2019-08-07 06:03:36
186.227.255.131 attack
RDP Bruteforce
2019-08-07 06:45:35
40.74.86.130 attackspambots
RDP Bruteforce
2019-08-07 06:05:33
138.186.135.240 attackbotsspam
Aug  6 23:28:53 tamoto postfix/smtpd[31473]: connect from unknown[138.186.135.240]
Aug  6 23:28:54 tamoto postfix/smtpd[31473]: warning: unknown[138.186.135.240]: SASL PLAIN authentication failed: authentication failure
Aug  6 23:28:54 tamoto postfix/smtpd[31473]: warning: unknown[138.186.135.240]: SASL PLAIN authentication failed: authentication failure
Aug  6 23:28:55 tamoto postfix/smtpd[31473]: warning: unknown[138.186.135.240]: SASL PLAIN authentication failed: authentication failure
Aug  6 23:28:55 tamoto postfix/smtpd[31473]: warning: unknown[138.186.135.240]: SASL PLAIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.186.135.240
2019-08-07 06:36:35
221.162.255.82 attack
Aug  6 23:03:44 ns341937 sshd[5123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.82
Aug  6 23:03:47 ns341937 sshd[5123]: Failed password for invalid user fabian from 221.162.255.82 port 32928 ssh2
Aug  6 23:50:02 ns341937 sshd[13825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.82
...
2019-08-07 06:22:46
186.112.85.98 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 20:53:11,377 INFO [shellcode_manager] (186.112.85.98) no match, writing hexdump (d7c8e2a3988bdae188850b13eea8a146 :2964049) - MS17010 (EternalBlue)
2019-08-07 06:38:54
177.139.161.81 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 20:15:16,356 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.139.161.81)
2019-08-07 06:18:51
71.6.232.4 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-07 05:58:15
167.71.56.100 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-07 05:57:43
14.6.200.22 attack
Aug  7 01:27:38 server sshd\[4182\]: Invalid user mitchell from 14.6.200.22 port 44342
Aug  7 01:27:38 server sshd\[4182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.6.200.22
Aug  7 01:27:40 server sshd\[4182\]: Failed password for invalid user mitchell from 14.6.200.22 port 44342 ssh2
Aug  7 01:32:51 server sshd\[32761\]: Invalid user main from 14.6.200.22 port 37818
Aug  7 01:32:51 server sshd\[32761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.6.200.22
2019-08-07 06:44:30

Recently Reported IPs

6.133.251.202 228.185.243.99 174.100.167.134 146.110.214.131
71.137.121.4 204.114.89.86 177.51.85.221 190.113.148.79
173.206.190.144 24.37.24.218 197.204.146.160 161.63.16.88
4.84.34.208 152.219.19.65 167.214.250.222 128.220.88.230
250.124.186.163 101.236.193.97 149.121.173.65 137.212.180.65