Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.213.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.213.13.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 15:41:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 13.213.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.213.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.253.255.127 attackbotsspam
Jul 14 05:54:15 debian-2gb-nbg1-2 kernel: \[16957426.654895\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=168.253.255.127 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=232 ID=36849 DF PROTO=TCP SPT=14541 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0
2020-07-14 14:22:06
68.183.82.97 attack
Jul 13 23:21:47 server1 sshd\[6650\]: Failed password for invalid user itadmin from 68.183.82.97 port 35222 ssh2
Jul 13 23:25:18 server1 sshd\[7690\]: Invalid user vnc from 68.183.82.97
Jul 13 23:25:18 server1 sshd\[7690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.82.97 
Jul 13 23:25:20 server1 sshd\[7690\]: Failed password for invalid user vnc from 68.183.82.97 port 59784 ssh2
Jul 13 23:28:49 server1 sshd\[8686\]: Invalid user zym from 68.183.82.97
...
2020-07-14 14:02:45
197.162.254.234 attackspam
Automatic report - Port Scan Attack
2020-07-14 14:36:42
5.135.224.152 attackbotsspam
2020-07-14T07:40:20.888842galaxy.wi.uni-potsdam.de sshd[18996]: Invalid user aw from 5.135.224.152 port 54530
2020-07-14T07:40:20.890757galaxy.wi.uni-potsdam.de sshd[18996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-5-135-224.eu
2020-07-14T07:40:20.888842galaxy.wi.uni-potsdam.de sshd[18996]: Invalid user aw from 5.135.224.152 port 54530
2020-07-14T07:40:22.828957galaxy.wi.uni-potsdam.de sshd[18996]: Failed password for invalid user aw from 5.135.224.152 port 54530 ssh2
2020-07-14T07:43:07.298612galaxy.wi.uni-potsdam.de sshd[19300]: Invalid user kyh from 5.135.224.152 port 47320
2020-07-14T07:43:07.300474galaxy.wi.uni-potsdam.de sshd[19300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-5-135-224.eu
2020-07-14T07:43:07.298612galaxy.wi.uni-potsdam.de sshd[19300]: Invalid user kyh from 5.135.224.152 port 47320
2020-07-14T07:43:08.812381galaxy.wi.uni-potsdam.de sshd[19300]: Failed pass
...
2020-07-14 14:01:19
112.21.188.148 attackbotsspam
2020-07-14T07:53:27.265296vps751288.ovh.net sshd\[24514\]: Invalid user nasser from 112.21.188.148 port 43754
2020-07-14T07:53:27.272341vps751288.ovh.net sshd\[24514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.188.148
2020-07-14T07:53:29.230464vps751288.ovh.net sshd\[24514\]: Failed password for invalid user nasser from 112.21.188.148 port 43754 ssh2
2020-07-14T07:56:17.719814vps751288.ovh.net sshd\[24548\]: Invalid user sandra from 112.21.188.148 port 39648
2020-07-14T07:56:17.726756vps751288.ovh.net sshd\[24548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.188.148
2020-07-14 14:25:20
103.23.36.254 attackspambots
Jul 14 05:54:21 smtp postfix/smtpd[68630]: NOQUEUE: reject: RCPT from unknown[103.23.36.254]: 554 5.7.1 Service unavailable; Client host [103.23.36.254] blocked using cbl.abuseat.org; Blocked - see http://www.abuseat.org/lookup.cgi?ip=103.23.36.254; from= to= proto=ESMTP helo=<[103.23.36.254]>
...
2020-07-14 14:17:07
211.169.234.55 attackbots
Jul 14 05:54:01 mellenthin sshd[23169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.169.234.55
Jul 14 05:54:04 mellenthin sshd[23169]: Failed password for invalid user bank from 211.169.234.55 port 59580 ssh2
2020-07-14 14:31:16
106.13.44.100 attack
2020-07-14T04:12:47.627122shield sshd\[964\]: Invalid user tania from 106.13.44.100 port 40774
2020-07-14T04:12:47.637019shield sshd\[964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.100
2020-07-14T04:12:50.077493shield sshd\[964\]: Failed password for invalid user tania from 106.13.44.100 port 40774 ssh2
2020-07-14T04:21:28.667999shield sshd\[3287\]: Invalid user jboss from 106.13.44.100 port 45062
2020-07-14T04:21:28.676454shield sshd\[3287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.100
2020-07-14 14:11:38
203.177.138.155 attack
20/7/13@23:53:57: FAIL: Alarm-Network address from=203.177.138.155
...
2020-07-14 14:38:39
185.143.73.93 attack
2020-07-14 06:08:57 auth_plain authenticator failed for (User) [185.143.73.93]: 535 Incorrect authentication data (set_id=holly@mail.csmailer.org)
2020-07-14 06:09:19 auth_plain authenticator failed for (User) [185.143.73.93]: 535 Incorrect authentication data (set_id=cls@mail.csmailer.org)
2020-07-14 06:09:41 auth_plain authenticator failed for (User) [185.143.73.93]: 535 Incorrect authentication data (set_id=admitere@mail.csmailer.org)
2020-07-14 06:10:01 auth_plain authenticator failed for (User) [185.143.73.93]: 535 Incorrect authentication data (set_id=alaska@mail.csmailer.org)
2020-07-14 06:10:27 auth_plain authenticator failed for (User) [185.143.73.93]: 535 Incorrect authentication data (set_id=twister@mail.csmailer.org)
...
2020-07-14 14:10:30
159.65.142.103 attackbotsspam
Jul 14 05:55:24 web8 sshd\[25911\]: Invalid user roberto from 159.65.142.103
Jul 14 05:55:24 web8 sshd\[25911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.142.103
Jul 14 05:55:26 web8 sshd\[25911\]: Failed password for invalid user roberto from 159.65.142.103 port 34192 ssh2
Jul 14 05:58:48 web8 sshd\[27623\]: Invalid user suporte from 159.65.142.103
Jul 14 05:58:48 web8 sshd\[27623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.142.103
2020-07-14 14:06:11
103.254.120.222 attackbots
Jul 14 09:05:00 ift sshd\[55458\]: Invalid user ts from 103.254.120.222Jul 14 09:05:03 ift sshd\[55458\]: Failed password for invalid user ts from 103.254.120.222 port 44928 ssh2Jul 14 09:08:26 ift sshd\[56035\]: Invalid user magento from 103.254.120.222Jul 14 09:08:29 ift sshd\[56035\]: Failed password for invalid user magento from 103.254.120.222 port 39608 ssh2Jul 14 09:11:51 ift sshd\[56692\]: Invalid user musa from 103.254.120.222
...
2020-07-14 14:37:06
103.78.81.227 attack
Jul 14 07:49:57 vpn01 sshd[12423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.78.81.227
Jul 14 07:49:59 vpn01 sshd[12423]: Failed password for invalid user cyk from 103.78.81.227 port 39154 ssh2
...
2020-07-14 14:26:55
18.180.129.105 attackspambots
18.180.129.105 - - [14/Jul/2020:05:11:44 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
18.180.129.105 - - [14/Jul/2020:05:11:46 +0100] "POST /wp-login.php HTTP/1.1" 200 1685 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
18.180.129.105 - - [14/Jul/2020:05:11:47 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-14 14:20:08
171.244.8.64 attack
Jul 14 03:46:02 scw-6657dc sshd[2695]: Failed password for list from 171.244.8.64 port 51108 ssh2
Jul 14 03:46:02 scw-6657dc sshd[2695]: Failed password for list from 171.244.8.64 port 51108 ssh2
Jul 14 03:54:07 scw-6657dc sshd[2934]: Invalid user master from 171.244.8.64 port 52310
...
2020-07-14 14:29:13

Recently Reported IPs

77.23.49.159 104.16.245.54 104.16.246.23 104.16.249.48
104.16.3.18 104.16.248.48 104.16.246.54 104.16.35.161
104.16.4.152 104.16.32.106 104.16.4.217 104.16.48.75
104.16.50.96 104.16.48.1 104.16.52.39 104.16.44.18
104.16.55.206 104.16.51.38 104.16.53.18 104.16.49.229