Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.163.140.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.163.140.13.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 09:36:47 CST 2023
;; MSG SIZE  rcvd: 106
Host info
13.140.163.64.in-addr.arpa domain name pointer adsl-64-163-140-13.dsl.snfc21.pacbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.140.163.64.in-addr.arpa	name = adsl-64-163-140-13.dsl.snfc21.pacbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.70.90.59 attack
Jan  8 13:30:32 DAAP sshd[26419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.90.59  user=root
Jan  8 13:30:33 DAAP sshd[26419]: Failed password for root from 193.70.90.59 port 40720 ssh2
Jan  8 13:33:51 DAAP sshd[26473]: Invalid user user from 193.70.90.59 port 37396
Jan  8 13:33:51 DAAP sshd[26473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.90.59
Jan  8 13:33:51 DAAP sshd[26473]: Invalid user user from 193.70.90.59 port 37396
Jan  8 13:33:54 DAAP sshd[26473]: Failed password for invalid user user from 193.70.90.59 port 37396 ssh2
...
2020-01-08 20:57:41
106.39.177.175 attackspam
Unauthorized connection attempt detected from IP address 106.39.177.175 to port 22 [T]
2020-01-08 20:33:54
59.25.151.105 attack
MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability
2020-01-08 20:41:10
203.83.182.138 attack
20/1/8@00:52:11: FAIL: Alarm-Network address from=203.83.182.138
20/1/8@00:52:11: FAIL: Alarm-Network address from=203.83.182.138
...
2020-01-08 21:06:24
114.141.191.238 attackbots
$f2bV_matches
2020-01-08 21:06:38
36.77.94.56 attack
1578461120 - 01/08/2020 06:25:20 Host: 36.77.94.56/36.77.94.56 Port: 445 TCP Blocked
2020-01-08 20:32:50
115.23.68.239 attackspambots
Unauthorized connection attempt detected from IP address 115.23.68.239 to port 5906
2020-01-08 20:40:43
203.90.234.22 attackbots
Unauthorized connection attempt from IP address 203.90.234.22 on Port 445(SMB)
2020-01-08 20:48:15
220.173.123.58 attack
Forbidden directory scan :: 2020/01/08 09:05:52 [error] 1029#1029: *56533 access forbidden by rule, client: 220.173.123.58, server: [censored_1], request: "GET /.../exchange-2010/exchange-2010-list-all-mailbox-sizes HTTP/1.1", host: "www.[censored_1]"
2020-01-08 20:34:47
103.205.113.131 attack
1578458684 - 01/08/2020 05:44:44 Host: 103.205.113.131/103.205.113.131 Port: 445 TCP Blocked
2020-01-08 21:03:05
46.38.144.117 attackspambots
Jan  8 13:46:15 relay postfix/smtpd\[2628\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  8 13:46:46 relay postfix/smtpd\[1396\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  8 13:47:56 relay postfix/smtpd\[29599\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  8 13:48:27 relay postfix/smtpd\[30847\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  8 13:49:38 relay postfix/smtpd\[28917\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-08 20:57:16
211.220.27.191 attack
Jan  8 10:49:06 124388 sshd[23896]: Invalid user ybb from 211.220.27.191 port 57214
Jan  8 10:49:06 124388 sshd[23896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.27.191
Jan  8 10:49:06 124388 sshd[23896]: Invalid user ybb from 211.220.27.191 port 57214
Jan  8 10:49:08 124388 sshd[23896]: Failed password for invalid user ybb from 211.220.27.191 port 57214 ssh2
Jan  8 10:51:38 124388 sshd[23906]: Invalid user nrx from 211.220.27.191 port 54586
2020-01-08 20:49:31
47.188.41.97 attack
Automatic report - SSH Brute-Force Attack
2020-01-08 20:39:33
187.188.193.211 attack
2020-01-08T14:07:25.416150centos sshd\[965\]: Invalid user bever from 187.188.193.211 port 54912
2020-01-08T14:07:25.421133centos sshd\[965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-193-211.totalplay.net
2020-01-08T14:07:27.016214centos sshd\[965\]: Failed password for invalid user bever from 187.188.193.211 port 54912 ssh2
2020-01-08 21:08:29
118.70.126.50 attack
20/1/7@23:45:15: FAIL: Alarm-Network address from=118.70.126.50
20/1/7@23:45:16: FAIL: Alarm-Network address from=118.70.126.50
...
2020-01-08 20:38:20

Recently Reported IPs

227.211.89.225 87.57.27.26 60.11.136.224 178.171.27.162
31.149.62.74 40.67.201.215 40.117.98.186 234.95.20.204
121.22.55.255 104.42.86.94 73.53.32.246 75.10.122.235
92.25.199.64 86.42.142.160 18.178.29.133 7.27.2.51
80.181.128.214 85.203.77.17 39.52.201.144 47.227.132.160