Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.64.225.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;249.64.225.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 05:16:43 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.225.64.249.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.225.64.249.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.17.149.194 attackspambots
445/tcp 445/tcp 445/tcp
[2019-07-05/29]3pkt
2019-07-30 12:33:51
165.227.214.163 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.214.163
Failed password for invalid user web from 165.227.214.163 port 56803 ssh2
Invalid user rahim from 165.227.214.163 port 51238
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.214.163
Failed password for invalid user rahim from 165.227.214.163 port 51238 ssh2
2019-07-30 13:02:53
67.43.15.7 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-18/07-29]9pkt,1pt.(tcp)
2019-07-30 12:33:35
46.105.96.145 attack
2019-07-30T03:15:14.819953abusebot-3.cloudsearch.cf sshd\[21590\]: Invalid user agylis from 46.105.96.145 port 35388
2019-07-30 13:14:05
118.68.170.172 attackspambots
2019-07-30T04:31:44.152009abusebot.cloudsearch.cf sshd\[11883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118-68-170-172.higio.net  user=root
2019-07-30 12:34:22
104.248.161.244 attack
Jul 30 07:28:53 yabzik sshd[8111]: Failed password for root from 104.248.161.244 port 48396 ssh2
Jul 30 07:35:01 yabzik sshd[9902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.161.244
Jul 30 07:35:03 yabzik sshd[9902]: Failed password for invalid user oracle from 104.248.161.244 port 45800 ssh2
2019-07-30 12:42:38
154.8.197.176 attackbotsspam
Jul 30 05:48:16 localhost sshd\[11073\]: Invalid user isaac from 154.8.197.176 port 40634
Jul 30 05:48:16 localhost sshd\[11073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.197.176
...
2019-07-30 12:48:52
95.181.45.102 attack
60001/tcp 23/tcp 5555/tcp...
[2019-06-26/07-29]6pkt,4pt.(tcp)
2019-07-30 12:39:34
118.126.111.108 attackbotsspam
2019-07-30T13:08:33.927016luisaranguren sshd[8875]: Connection from 118.126.111.108 port 36232 on 10.10.10.6 port 22
2019-07-30T13:08:38.764116luisaranguren sshd[8875]: Invalid user px from 118.126.111.108 port 36232
2019-07-30T13:08:38.768161luisaranguren sshd[8875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.111.108
2019-07-30T13:08:33.927016luisaranguren sshd[8875]: Connection from 118.126.111.108 port 36232 on 10.10.10.6 port 22
2019-07-30T13:08:38.764116luisaranguren sshd[8875]: Invalid user px from 118.126.111.108 port 36232
2019-07-30T13:08:40.820146luisaranguren sshd[8875]: Failed password for invalid user px from 118.126.111.108 port 36232 ssh2
...
2019-07-30 13:06:34
118.25.40.74 attackbotsspam
Jul 30 07:05:54 mail sshd\[32549\]: Failed password for invalid user user from 118.25.40.74 port 49752 ssh2
Jul 30 07:09:02 mail sshd\[398\]: Invalid user gmodserveur from 118.25.40.74 port 50672
Jul 30 07:09:02 mail sshd\[398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.40.74
Jul 30 07:09:03 mail sshd\[398\]: Failed password for invalid user gmodserveur from 118.25.40.74 port 50672 ssh2
Jul 30 07:12:13 mail sshd\[1095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.40.74  user=irc
2019-07-30 13:20:58
14.221.165.79 attack
Helo
2019-07-30 13:19:21
182.18.171.148 attack
Invalid user test6 from 182.18.171.148 port 36754
2019-07-30 13:01:09
110.45.145.178 attackbots
Invalid user support from 110.45.145.178 port 55114
2019-07-30 13:09:15
213.139.144.10 attack
Jul 29 21:32:04 vtv3 sshd\[21381\]: Invalid user tanvir from 213.139.144.10 port 53323
Jul 29 21:32:04 vtv3 sshd\[21381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
Jul 29 21:32:05 vtv3 sshd\[21381\]: Failed password for invalid user tanvir from 213.139.144.10 port 53323 ssh2
Jul 29 21:39:14 vtv3 sshd\[24740\]: Invalid user quin from 213.139.144.10 port 61974
Jul 29 21:39:14 vtv3 sshd\[24740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
Jul 29 21:53:33 vtv3 sshd\[31886\]: Invalid user dang from 213.139.144.10 port 56957
Jul 29 21:53:33 vtv3 sshd\[31886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
Jul 29 21:53:36 vtv3 sshd\[31886\]: Failed password for invalid user dang from 213.139.144.10 port 56957 ssh2
Jul 29 22:00:34 vtv3 sshd\[3145\]: Invalid user test1 from 213.139.144.10 port 54435
Jul 29 22:00:34 vtv3 sshd\[3145\]:
2019-07-30 12:54:35
185.244.25.105 attackspambots
DATE:2019-07-30_06:08:13, IP:185.244.25.105, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-30 12:52:52

Recently Reported IPs

49.225.92.162 166.195.67.105 197.252.125.74 52.169.164.253
110.183.114.94 68.225.228.54 252.27.33.55 237.106.70.32
6.147.149.170 210.174.229.79 172.91.105.52 64.183.50.170
32.0.196.131 32.167.214.123 170.249.211.49 70.186.9.124
7.196.55.95 122.10.125.42 249.58.113.174 93.56.104.54