Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.13.72.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.13.72.106.			IN	A

;; AUTHORITY SECTION:
.			88	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023041301 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 14 02:49:22 CST 2023
;; MSG SIZE  rcvd: 104
Host info
106.72.13.3.in-addr.arpa domain name pointer ec2-3-13-72-106.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.72.13.3.in-addr.arpa	name = ec2-3-13-72-106.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.45.78.87 attackspam
unauthorized connection attempt
2020-01-24 06:21:34
185.175.93.17 attack
01/23/2020-17:04:04.781864 185.175.93.17 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-24 06:07:52
210.212.194.6 attack
$f2bV_matches
2020-01-24 05:53:17
159.203.201.163 attackspam
01/23/2020-17:02:07.118881 159.203.201.163 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-24 05:55:29
51.38.230.5 attackbots
Unauthorized connection attempt detected from IP address 51.38.230.5 to port 2220 [J]
2020-01-24 06:20:48
186.214.200.169 attack
Unauthorized connection attempt from IP address 186.214.200.169 on Port 445(SMB)
2020-01-24 06:24:15
116.246.21.23 attack
Unauthorized connection attempt detected from IP address 116.246.21.23 to port 2220 [J]
2020-01-24 06:00:23
219.91.133.139 attackspambots
GET /wp-login.php
2020-01-24 06:01:28
213.150.206.88 attackbotsspam
Unauthorized connection attempt detected from IP address 213.150.206.88 to port 2220 [J]
2020-01-24 06:07:08
220.133.234.224 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-24 06:28:40
178.128.52.32 attackspambots
Unauthorized connection attempt detected from IP address 178.128.52.32 to port 2220 [J]
2020-01-24 06:25:22
45.224.105.120 attackbots
Cluster member 192.168.0.31 (-) said, DENY 45.224.105.120, Reason:[(imapd) Failed IMAP login from 45.224.105.120 (AR/Argentina/-): 1 in the last 3600 secs]
2020-01-24 05:54:17
222.252.30.117 attackbots
Jan 23 20:02:40 DAAP sshd[9171]: Invalid user temp from 222.252.30.117 port 53070
Jan 23 20:02:40 DAAP sshd[9171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.30.117
Jan 23 20:02:40 DAAP sshd[9171]: Invalid user temp from 222.252.30.117 port 53070
Jan 23 20:02:43 DAAP sshd[9171]: Failed password for invalid user temp from 222.252.30.117 port 53070 ssh2
...
2020-01-24 06:13:18
185.176.27.102 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 21555 proto: TCP cat: Misc Attack
2020-01-24 06:29:52
51.91.35.67 attackspambots
Unauthorized connection attempt detected from IP address 51.91.35.67 to port 2220 [J]
2020-01-24 05:50:18

Recently Reported IPs

143.244.204.226 84.116.192.101 142.44.142.13 202.160.33.24
162.158.190.78 172.70.147.122 13.27.0.193 82.30.4.195
95.90.167.95 116.62.56.185 15.19.169.236 237.89.36.214
163.111.107.230 60.241.5.0 252.249.197.56 59.89.5.89
113.190.235.164 194.45.197.217 131.213.248.74 6.92.59.217