Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.213.2.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.213.2.13.			IN	A

;; AUTHORITY SECTION:
.			268	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102300 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 23 20:19:06 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 13.2.213.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.2.213.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.31.240.47 attack
Unauthorized connection attempt detected from IP address 151.31.240.47 to port 82 [J]
2020-01-22 04:13:37
109.207.35.240 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-22 04:17:55
92.154.31.65 attack
1579611371 - 01/21/2020 13:56:11 Host: 92.154.31.65/92.154.31.65 Port: 445 TCP Blocked
2020-01-22 04:21:43
123.206.68.35 attackbots
2020-01-21T19:45:40.649172centos sshd\[16146\]: Invalid user andy from 123.206.68.35 port 54390
2020-01-21T19:45:40.653145centos sshd\[16146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.68.35
2020-01-21T19:45:42.667164centos sshd\[16146\]: Failed password for invalid user andy from 123.206.68.35 port 54390 ssh2
2020-01-22 04:08:04
189.171.76.24 attackspam
Unauthorized connection attempt detected from IP address 189.171.76.24 to port 8000 [J]
2020-01-22 04:20:50
96.69.11.243 attackspam
Honeypot attack, port: 81, PTR: 96-69-11-243-static.hfc.comcastbusiness.net.
2020-01-22 04:29:42
219.75.20.12 attackbotsspam
Honeypot attack, port: 5555, PTR: bb219-75-20-12.singnet.com.sg.
2020-01-22 04:11:34
221.13.203.109 attackspambots
Unauthorized connection attempt detected from IP address 221.13.203.109 to port 2220 [J]
2020-01-22 04:25:59
117.50.100.216 attackspambots
01/21/2020-12:30:02.028495 117.50.100.216 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-22 04:19:14
124.109.43.194 attackbotsspam
Attempts against Pop3/IMAP
2020-01-22 04:09:16
186.92.17.148 attack
Jan 21 19:59:28 nextcloud sshd\[31588\]: Invalid user ADMIN from 186.92.17.148
Jan 21 19:59:29 nextcloud sshd\[31588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.92.17.148
Jan 21 19:59:31 nextcloud sshd\[31588\]: Failed password for invalid user ADMIN from 186.92.17.148 port 49406 ssh2
...
2020-01-22 04:00:29
194.26.69.103 attack
Attempted to access Zmodo Wifi camera system, privately owned, secured.  Access denied.  Third attempt.  Portland, OR, USA
2020-01-22 04:20:06
150.129.164.227 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-22 04:35:56
91.134.140.242 attack
Unauthorized connection attempt detected from IP address 91.134.140.242 to port 2220 [J]
2020-01-22 03:59:10
178.62.199.240 attackspambots
Jan 21 20:23:33 www_kotimaassa_fi sshd[19388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.199.240
Jan 21 20:23:35 www_kotimaassa_fi sshd[19388]: Failed password for invalid user IEUser from 178.62.199.240 port 48475 ssh2
...
2020-01-22 04:29:23

Recently Reported IPs

1.134.204.40 1.135.111.253 213.231.192.101 1.134.79.40
1.133.139.141 1.133.251.13 1.132.254.9 1.133.219.111
1.133.115.46 1.132.18.250 193.182.254.61 1.134.147.151
1.132.152.182 1.131.28.8 1.131.169.229 129.117.235.81
1.130.198.67 1.13.50.41 1.130.186.203 1.130.10.72