Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.13.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.13.4.			IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:23:36 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 4.13.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.13.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.182.124.9 attack
Jul  3 13:34:37 core01 sshd\[13218\]: Invalid user wi from 192.182.124.9 port 44722
Jul  3 13:34:37 core01 sshd\[13218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.182.124.9
...
2019-07-03 19:42:05
95.216.19.59 attackspam
20 attempts against mh-misbehave-ban on rock.magehost.pro
2019-07-03 19:40:43
185.220.101.65 attack
Jul  3 05:44:46 localhost sshd\[7074\]: Invalid user admin from 185.220.101.65 port 44988
Jul  3 05:44:46 localhost sshd\[7074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.65
Jul  3 05:44:48 localhost sshd\[7074\]: Failed password for invalid user admin from 185.220.101.65 port 44988 ssh2
2019-07-03 19:16:08
5.143.134.151 attackspambots
23/tcp
[2019-07-03]1pkt
2019-07-03 19:25:56
94.191.60.199 attackspam
Jul  3 06:25:53 lnxded64 sshd[30413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.60.199
2019-07-03 19:45:19
183.89.107.211 attackbots
445/tcp
[2019-07-03]1pkt
2019-07-03 19:28:44
84.227.126.142 attackspam
Jul  3 11:23:13 mail sshd\[20746\]: Invalid user serveur from 84.227.126.142\
Jul  3 11:23:15 mail sshd\[20746\]: Failed password for invalid user serveur from 84.227.126.142 port 39634 ssh2\
Jul  3 11:25:27 mail sshd\[20786\]: Invalid user leila from 84.227.126.142\
Jul  3 11:25:29 mail sshd\[20786\]: Failed password for invalid user leila from 84.227.126.142 port 36902 ssh2\
Jul  3 11:27:38 mail sshd\[20805\]: Invalid user sonhn from 84.227.126.142\
Jul  3 11:27:41 mail sshd\[20805\]: Failed password for invalid user sonhn from 84.227.126.142 port 34236 ssh2\
2019-07-03 19:04:00
14.231.191.86 attackspam
445/tcp
[2019-07-03]1pkt
2019-07-03 19:40:18
83.209.186.35 attackbotsspam
5555/tcp
[2019-07-03]1pkt
2019-07-03 19:22:40
128.199.216.250 attackbotsspam
Jul  3 06:14:30 [host] sshd[22210]: Invalid user sistema from 128.199.216.250
Jul  3 06:14:30 [host] sshd[22210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.216.250
Jul  3 06:14:32 [host] sshd[22210]: Failed password for invalid user sistema from 128.199.216.250 port 57945 ssh2
2019-07-03 19:47:39
192.160.102.165 attack
SSH login attempts brute force.
2019-07-03 19:34:36
220.90.129.103 attackspam
2019-07-03T12:17:06.173788cavecanem sshd[24629]: Invalid user zan from 220.90.129.103 port 42874
2019-07-03T12:17:06.177178cavecanem sshd[24629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.90.129.103
2019-07-03T12:17:06.173788cavecanem sshd[24629]: Invalid user zan from 220.90.129.103 port 42874
2019-07-03T12:17:08.010447cavecanem sshd[24629]: Failed password for invalid user zan from 220.90.129.103 port 42874 ssh2
2019-07-03T12:19:45.948440cavecanem sshd[25285]: Invalid user aoyule from 220.90.129.103 port 38672
2019-07-03T12:19:45.950820cavecanem sshd[25285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.90.129.103
2019-07-03T12:19:45.948440cavecanem sshd[25285]: Invalid user aoyule from 220.90.129.103 port 38672
2019-07-03T12:19:48.280514cavecanem sshd[25285]: Failed password for invalid user aoyule from 220.90.129.103 port 38672 ssh2
2019-07-03T12:22:19.176831cavecanem sshd[25991]: Invali
...
2019-07-03 19:18:18
206.189.131.213 attackbotsspam
Fail2Ban Ban Triggered
2019-07-03 19:18:40
61.94.143.64 attackbotsspam
445/tcp
[2019-07-03]1pkt
2019-07-03 19:41:35
202.191.127.90 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 03:31:23,021 INFO [shellcode_manager] (202.191.127.90) no match, writing hexdump (64f371daefceb631a4587ecf118f6787 :2204091) - MS17010 (EternalBlue)
2019-07-03 19:41:12

Recently Reported IPs

104.18.8.153 104.18.8.113 104.18.79.224 104.18.8.136
104.18.8.156 104.18.8.159 104.18.8.207 104.18.8.211
104.18.8.175 104.18.8.198 104.18.8.215 104.18.8.204
104.18.13.44 104.18.8.130 104.18.13.52 104.18.13.55
42.158.38.135 104.19.157.6 104.19.158.21 104.19.159.73