Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.185.164.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42946
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.185.164.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:16:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.164.185.34.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 13.164.185.34.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
206.189.149.9 attackbotsspam
Feb 20 01:43:16 plusreed sshd[23482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.149.9  user=mysql
Feb 20 01:43:18 plusreed sshd[23482]: Failed password for mysql from 206.189.149.9 port 45348 ssh2
...
2020-02-20 19:47:36
71.6.233.150 attack
Fail2Ban Ban Triggered
2020-02-20 20:05:55
94.255.207.235 attack
Honeypot attack, port: 5555, PTR: 94-255-207-235.cust.bredband2.com.
2020-02-20 20:05:27
221.151.112.217 attack
leo_www
2020-02-20 19:45:31
134.3.140.153 attackbots
Invalid user family from 134.3.140.153 port 56362
2020-02-20 20:19:16
190.103.181.229 attackbots
Feb 20 11:14:42 minden010 sshd[15330]: Failed password for vmail from 190.103.181.229 port 41936 ssh2
Feb 20 11:18:05 minden010 sshd[16903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.103.181.229
Feb 20 11:18:06 minden010 sshd[16903]: Failed password for invalid user amandabackup from 190.103.181.229 port 56608 ssh2
...
2020-02-20 20:11:45
89.248.162.235 attackbotsspam
trying to access non-authorized port
2020-02-20 19:38:50
46.101.112.205 attackbotsspam
xmlrpc attack
2020-02-20 20:19:37
187.178.174.149 attack
trying to access non-authorized port
2020-02-20 20:07:45
36.89.29.17 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 20:12:40
120.220.15.5 attack
5x Failed Password
2020-02-20 19:48:32
132.232.30.87 attackspam
Feb 20 04:58:03 firewall sshd[27095]: Invalid user wangxue from 132.232.30.87
Feb 20 04:58:05 firewall sshd[27095]: Failed password for invalid user wangxue from 132.232.30.87 port 48434 ssh2
Feb 20 04:59:41 firewall sshd[27165]: Invalid user user03 from 132.232.30.87
...
2020-02-20 19:54:26
156.236.119.113 attackbotsspam
Feb 20 07:00:20 ws26vmsma01 sshd[961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.113
Feb 20 07:00:21 ws26vmsma01 sshd[961]: Failed password for invalid user remote from 156.236.119.113 port 31716 ssh2
...
2020-02-20 19:41:33
106.52.106.61 attack
invalid login attempt (support)
2020-02-20 20:04:11
79.85.2.163 attack
$f2bV_matches
2020-02-20 20:13:57

Recently Reported IPs

175.93.99.254 38.65.91.255 178.156.133.25 32.252.6.215
238.239.104.184 55.26.66.55 178.104.39.85 219.21.113.238
14.191.78.226 235.156.226.48 199.166.13.137 209.156.3.177
174.71.34.209 251.92.158.174 141.235.51.28 231.251.246.78
96.172.166.115 186.173.253.106 72.12.115.102 133.169.128.42