Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.99.180.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.99.180.128.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:40:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 128.180.99.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 128.180.99.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.114.96.156 attackbots
May  1 12:21:47 sip sshd[63708]: Invalid user ying from 167.114.96.156 port 48510
May  1 12:21:49 sip sshd[63708]: Failed password for invalid user ying from 167.114.96.156 port 48510 ssh2
May  1 12:28:35 sip sshd[63859]: Invalid user user from 167.114.96.156 port 32996
...
2020-05-01 18:54:41
45.119.84.254 attackbots
May  1 00:25:40 php1 sshd\[14958\]: Invalid user ramesh from 45.119.84.254
May  1 00:25:40 php1 sshd\[14958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.84.254
May  1 00:25:42 php1 sshd\[14958\]: Failed password for invalid user ramesh from 45.119.84.254 port 53726 ssh2
May  1 00:28:48 php1 sshd\[15224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.84.254  user=root
May  1 00:28:50 php1 sshd\[15224\]: Failed password for root from 45.119.84.254 port 41894 ssh2
2020-05-01 18:39:35
91.121.65.15 attackbots
Invalid user ts3 from 91.121.65.15 port 59934
2020-05-01 18:27:42
212.64.40.35 attackspam
2020-04-30T14:52:12.7920701495-001 sshd[49120]: Invalid user malina from 212.64.40.35 port 34506
2020-04-30T14:52:14.4814961495-001 sshd[49120]: Failed password for invalid user malina from 212.64.40.35 port 34506 ssh2
2020-04-30T14:53:56.0647631495-001 sshd[49174]: Invalid user kf from 212.64.40.35 port 58476
2020-04-30T14:53:56.0731101495-001 sshd[49174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.35
2020-04-30T14:53:56.0647631495-001 sshd[49174]: Invalid user kf from 212.64.40.35 port 58476
2020-04-30T14:53:57.3644921495-001 sshd[49174]: Failed password for invalid user kf from 212.64.40.35 port 58476 ssh2
...
2020-05-01 18:47:19
54.70.217.15 attackbotsspam
Invalid user temp1 from 54.70.217.15 port 41260
2020-05-01 18:34:05
79.143.44.122 attackbotsspam
May  1 07:18:37 vps46666688 sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.44.122
May  1 07:18:39 vps46666688 sshd[16926]: Failed password for invalid user maddalena from 79.143.44.122 port 36529 ssh2
...
2020-05-01 18:30:19
61.182.232.38 attackspam
Invalid user me from 61.182.232.38 port 51222
2020-05-01 18:32:20
107.175.33.240 attack
Invalid user ciro from 107.175.33.240 port 43568
2020-05-01 18:16:40
223.223.190.131 attack
SSH/22 MH Probe, BF, Hack -
2020-05-01 18:43:04
187.72.167.124 attackbots
Invalid user philipp from 187.72.167.124 port 41076
2020-05-01 18:52:50
49.232.16.47 attackbots
Invalid user sg from 49.232.16.47 port 52874
2020-05-01 18:38:17
51.178.24.61 attackbots
20 attempts against mh-ssh on install-test
2020-05-01 18:34:18
134.122.99.69 attackspambots
Invalid user cssserver from 134.122.99.69 port 60444
2020-05-01 18:57:20
106.12.190.104 attack
20 attempts against mh-ssh on install-test
2020-05-01 18:22:12
192.144.183.188 attackbotsspam
Invalid user xmh from 192.144.183.188 port 34314
2020-05-01 18:50:32

Recently Reported IPs

41.132.110.91 184.96.52.222 27.82.211.244 97.69.147.150
115.88.154.162 190.119.240.167 188.230.42.166 45.169.64.216
239.165.212.43 216.132.23.130 221.247.138.245 181.26.226.95
73.36.155.201 14.100.216.96 44.63.204.136 140.78.112.33
157.236.254.201 94.1.198.96 254.191.182.49 179.72.122.81