Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.239.220.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.239.220.13.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040101 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 19:11:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 13.220.239.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.220.239.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.6.44.28 attackbots
(pop3d) Failed POP3 login from 112.6.44.28 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May  7 08:23:04 ir1 dovecot[264309]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=112.6.44.28, lip=5.63.12.44, session=
2020-05-07 15:47:44
93.47.168.80 attack
Port probing on unauthorized port 23
2020-05-07 16:12:52
5.58.18.104 attackspam
Port probing on unauthorized port 23
2020-05-07 15:40:07
111.229.191.95 attackspambots
2020-05-07T04:16:26.327537shield sshd\[1204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.191.95  user=root
2020-05-07T04:16:28.198149shield sshd\[1204\]: Failed password for root from 111.229.191.95 port 52318 ssh2
2020-05-07T04:17:46.252630shield sshd\[1520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.191.95  user=root
2020-05-07T04:17:48.103552shield sshd\[1520\]: Failed password for root from 111.229.191.95 port 39772 ssh2
2020-05-07T04:19:12.598048shield sshd\[1682\]: Invalid user apps from 111.229.191.95 port 55464
2020-05-07 15:41:43
208.109.11.34 attack
May  7 05:47:26 server sshd[10840]: Failed password for root from 208.109.11.34 port 58872 ssh2
May  7 05:50:18 server sshd[11086]: Failed password for root from 208.109.11.34 port 39058 ssh2
...
2020-05-07 15:54:57
106.54.97.55 attackbotsspam
$f2bV_matches
2020-05-07 16:13:35
68.183.88.186 attack
Fail2Ban Ban Triggered
2020-05-07 15:50:07
37.187.21.81 attackspambots
$f2bV_matches
2020-05-07 16:15:16
106.13.168.107 attackbots
2020-05-07T03:51:28.588747abusebot-4.cloudsearch.cf sshd[13197]: Invalid user admin from 106.13.168.107 port 34068
2020-05-07T03:51:28.595163abusebot-4.cloudsearch.cf sshd[13197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.168.107
2020-05-07T03:51:28.588747abusebot-4.cloudsearch.cf sshd[13197]: Invalid user admin from 106.13.168.107 port 34068
2020-05-07T03:51:30.481363abusebot-4.cloudsearch.cf sshd[13197]: Failed password for invalid user admin from 106.13.168.107 port 34068 ssh2
2020-05-07T03:52:55.728995abusebot-4.cloudsearch.cf sshd[13276]: Invalid user dara from 106.13.168.107 port 45218
2020-05-07T03:52:55.735951abusebot-4.cloudsearch.cf sshd[13276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.168.107
2020-05-07T03:52:55.728995abusebot-4.cloudsearch.cf sshd[13276]: Invalid user dara from 106.13.168.107 port 45218
2020-05-07T03:52:57.230937abusebot-4.cloudsearch.cf sshd[13276]: F
...
2020-05-07 15:59:03
222.186.42.155 attack
detected by Fail2Ban
2020-05-07 15:57:16
62.84.155.107 attackbotsspam
Port scan detected on ports: 88[TCP], 88[TCP], 88[TCP]
2020-05-07 15:42:04
112.96.105.200 attackbotsspam
bruteforce detected
2020-05-07 15:49:16
49.165.96.21 attackspambots
$f2bV_matches
2020-05-07 16:17:06
122.51.238.211 attack
May  7 08:19:33 piServer sshd[5532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.238.211 
May  7 08:19:35 piServer sshd[5532]: Failed password for invalid user woc from 122.51.238.211 port 47482 ssh2
May  7 08:25:16 piServer sshd[6074]: Failed password for root from 122.51.238.211 port 51998 ssh2
...
2020-05-07 15:58:50
95.85.60.251 attackspam
2020-05-07T05:52:15.007505shield sshd\[19881\]: Invalid user demo from 95.85.60.251 port 59438
2020-05-07T05:52:15.011195shield sshd\[19881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
2020-05-07T05:52:16.785887shield sshd\[19881\]: Failed password for invalid user demo from 95.85.60.251 port 59438 ssh2
2020-05-07T05:59:42.024555shield sshd\[21237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251  user=root
2020-05-07T05:59:44.496872shield sshd\[21237\]: Failed password for root from 95.85.60.251 port 40738 ssh2
2020-05-07 15:45:00

Recently Reported IPs

233.28.167.115 37.44.253.53 86.47.24.3 169.200.199.140
95.153.162.84 55.246.28.1 246.176.4.42 64.78.70.35
62.185.197.53 168.90.116.26 81.133.90.51 155.192.27.242
68.184.214.188 214.55.196.156 49.172.152.87 7.133.46.80
157.202.255.95 0.0.0.38 203.82.51.102 0.0.226.184