Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.13.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.13.139.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 459 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 05:08:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 139.13.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.13.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.224.167.154 attackspam
Attempts against Pop3/IMAP
2019-07-06 12:48:24
117.6.160.3 attackspam
Invalid user vmail from 117.6.160.3 port 65056
2019-07-06 13:00:56
121.182.166.82 attackbotsspam
Jul  6 05:54:31 icinga sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.82
Jul  6 05:54:33 icinga sshd[18994]: Failed password for invalid user ow from 121.182.166.82 port 16952 ssh2
...
2019-07-06 12:46:45
210.113.68.42 attack
*Port Scan* detected from 210.113.68.42 (KR/South Korea/-). 4 hits in the last 275 seconds
2019-07-06 12:31:05
185.234.219.102 attackbots
Jul  6 05:07:45 mail postfix/smtpd\[1085\]: warning: unknown\[185.234.219.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 05:14:34 mail postfix/smtpd\[1085\]: warning: unknown\[185.234.219.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 05:48:36 mail postfix/smtpd\[2240\]: warning: unknown\[185.234.219.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 05:55:25 mail postfix/smtpd\[2394\]: warning: unknown\[185.234.219.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-06 13:05:57
179.32.51.218 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-07-06 13:02:08
202.42.100.26 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 03:00:11,442 INFO [amun_request_handler] PortScan Detected on Port: 445 (202.42.100.26)
2019-07-06 12:37:08
106.47.40.101 attack
probing for wordpress favicon backdoor
GET /home/favicon.ico
2019-07-06 12:59:07
176.113.127.10 attackbotsspam
Unauthorized IMAP connection attempt.
2019-07-06 12:29:28
188.117.157.70 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 02:58:49,638 INFO [amun_request_handler] PortScan Detected on Port: 445 (188.117.157.70)
2019-07-06 12:45:18
79.137.20.253 attack
Automatic report - Web App Attack
2019-07-06 12:33:43
92.127.153.25 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 02:31:06,822 INFO [amun_request_handler] PortScan Detected on Port: 445 (92.127.153.25)
2019-07-06 13:15:12
185.154.73.174 attackspambots
[portscan] Port scan
2019-07-06 12:44:51
177.66.59.210 attackbotsspam
smtp auth brute force
2019-07-06 13:04:03
191.53.195.20 attackspambots
SMTP-sasl brute force
...
2019-07-06 12:29:04

Recently Reported IPs

104.18.125.249 104.18.13.202 104.18.13.254 104.18.131.84
104.18.132.9 104.18.138.169 104.18.14.186 104.18.141.164
104.18.147.75 104.18.15.186 104.18.150.73 104.18.151.73
104.18.154.21 104.18.159.129 104.18.16.114 104.18.16.59
104.18.162.35 104.18.163.35 104.18.17.114 104.18.17.59