Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Four Corners

Region: Florida

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.13.14.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63044
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;207.13.14.18.			IN	A

;; AUTHORITY SECTION:
.			1725	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090402 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 05 03:49:25 CST 2019
;; MSG SIZE  rcvd: 116
Host info
18.14.13.207.in-addr.arpa domain name pointer host18.orl2.omnihsiaspnt.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
18.14.13.207.in-addr.arpa	name = host18.orl2.omnihsiaspnt.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.76.251.205 attackbots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-09 17:14:27
61.164.47.131 attackbots
Sep  9 08:39:15 root sshd[15279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.47.131 
...
2020-09-09 17:12:48
138.197.222.141 attack
SIP/5060 Probe, BF, Hack -
2020-09-09 17:00:06
168.227.78.94 attack
reported through recidive - multiple failed attempts(SSH)
2020-09-09 17:34:34
156.199.2.86 attackspambots
Port probing on unauthorized port 23
2020-09-09 17:24:08
185.247.224.25 attack
$f2bV_matches
2020-09-09 17:36:41
200.54.242.46 attackbots
2020-09-08T15:55:05.915794hostname sshd[64931]: Failed password for root from 200.54.242.46 port 54851 ssh2
...
2020-09-09 17:12:15
201.182.72.250 attackspambots
Sep  9 02:43:51 IngegnereFirenze sshd[17290]: User root from 201.182.72.250 not allowed because not listed in AllowUsers
...
2020-09-09 17:15:43
173.249.16.117 attackbotsspam
...
2020-09-09 17:09:32
179.178.232.50 attackspambots
Icarus honeypot on github
2020-09-09 17:26:10
85.214.120.205 attackspam
Sep  8 21:41:08 home sshd[1309159]: Failed password for root from 85.214.120.205 port 57504 ssh2
Sep  8 21:44:22 home sshd[1309445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.214.120.205  user=root
Sep  8 21:44:23 home sshd[1309445]: Failed password for root from 85.214.120.205 port 41732 ssh2
Sep  8 21:47:38 home sshd[1309793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.214.120.205  user=root
Sep  8 21:47:40 home sshd[1309793]: Failed password for root from 85.214.120.205 port 56560 ssh2
...
2020-09-09 16:57:17
24.171.214.177 attackbots
[portscan] Port scan
2020-09-09 16:57:57
54.37.71.204 attackspam
*Port Scan* detected from 54.37.71.204 (FR/France/Grand Est/Strasbourg/204.ip-54-37-71.eu). 4 hits in the last 290 seconds
2020-09-09 17:20:54
107.179.13.141 attack
Port scan denied
2020-09-09 17:25:50
171.236.71.110 attackspambots
[portscan] Port scan
2020-09-09 17:18:49

Recently Reported IPs

5.188.211.35 5.188.211.26 5.188.211.22 5.188.211.16
5.188.211.15 5.188.211.14 5.188.211.10 5.188.210.242
132.41.162.92 5.188.210.58 5.188.210.56 5.188.210.31
5.188.210.23 5.188.210.19 5.188.210.10 4.79.75.79
146.173.241.32 5.188.211.24 5.188.211.21 5.188.211.13