Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.113.189.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24353
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.113.189.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:57:53 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.189.113.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.189.113.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.191.186.203 attack
" "
2020-06-20 12:34:05
2.180.16.225 attackspambots
06/19/2020-23:56:16.351088 2.180.16.225 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-20 12:22:31
222.186.180.130 attackbots
Jun 20 00:44:53 NPSTNNYC01T sshd[17235]: Failed password for root from 222.186.180.130 port 44860 ssh2
Jun 20 00:45:06 NPSTNNYC01T sshd[17259]: Failed password for root from 222.186.180.130 port 50504 ssh2
...
2020-06-20 12:47:45
63.83.76.12 attack
2020-06-20 12:34:59
61.177.172.177 attackspam
$f2bV_matches
2020-06-20 12:23:44
185.173.35.5 attackspambots
" "
2020-06-20 12:25:54
118.25.27.102 attackspambots
Jun 20 06:08:28 meumeu sshd[976701]: Invalid user store from 118.25.27.102 port 50924
Jun 20 06:08:28 meumeu sshd[976701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.102 
Jun 20 06:08:28 meumeu sshd[976701]: Invalid user store from 118.25.27.102 port 50924
Jun 20 06:08:30 meumeu sshd[976701]: Failed password for invalid user store from 118.25.27.102 port 50924 ssh2
Jun 20 06:12:32 meumeu sshd[976949]: Invalid user inma from 118.25.27.102 port 44172
Jun 20 06:12:32 meumeu sshd[976949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.102 
Jun 20 06:12:32 meumeu sshd[976949]: Invalid user inma from 118.25.27.102 port 44172
Jun 20 06:12:35 meumeu sshd[976949]: Failed password for invalid user inma from 118.25.27.102 port 44172 ssh2
Jun 20 06:16:28 meumeu sshd[978868]: Invalid user bss from 118.25.27.102 port 37416
...
2020-06-20 12:28:20
193.33.111.17 attackspam
Jun 20 10:06:33 dhoomketu sshd[895113]: Invalid user redbot from 193.33.111.17 port 44136
Jun 20 10:06:33 dhoomketu sshd[895113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.111.17 
Jun 20 10:06:33 dhoomketu sshd[895113]: Invalid user redbot from 193.33.111.17 port 44136
Jun 20 10:06:34 dhoomketu sshd[895113]: Failed password for invalid user redbot from 193.33.111.17 port 44136 ssh2
Jun 20 10:09:47 dhoomketu sshd[895239]: Invalid user wwwadmin from 193.33.111.17 port 46566
...
2020-06-20 12:46:01
179.191.51.203 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-20 12:08:47
106.51.85.66 attack
$f2bV_matches
2020-06-20 12:30:19
220.184.74.86 attackbots
Jun 20 06:24:03 OPSO sshd\[27161\]: Invalid user twintown from 220.184.74.86 port 41159
Jun 20 06:24:03 OPSO sshd\[27161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.184.74.86
Jun 20 06:24:05 OPSO sshd\[27161\]: Failed password for invalid user twintown from 220.184.74.86 port 41159 ssh2
Jun 20 06:28:14 OPSO sshd\[27804\]: Invalid user isaac from 220.184.74.86 port 31847
Jun 20 06:28:14 OPSO sshd\[27804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.184.74.86
2020-06-20 12:47:11
118.25.27.67 attack
2020-06-20T03:56:20+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-06-20 12:17:13
170.84.39.252 attackspambots
2020-06-20 05:55:52,943 fail2ban.actions: WARNING [ssh] Ban 170.84.39.252
2020-06-20 12:41:11
104.206.128.70 attack
Jun 20 05:55:55 debian-2gb-nbg1-2 kernel: \[14884041.718342\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.206.128.70 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=237 ID=54321 PROTO=TCP SPT=54475 DPT=2748 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-20 12:36:19
45.90.58.42 attackbots
Jun 20 05:53:11 sip sshd[709048]: Failed password for invalid user ftpuser from 45.90.58.42 port 45404 ssh2
Jun 20 05:56:24 sip sshd[709062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.58.42  user=root
Jun 20 05:56:26 sip sshd[709062]: Failed password for root from 45.90.58.42 port 46126 ssh2
...
2020-06-20 12:09:53

Recently Reported IPs

154.136.61.3 130.76.157.202 160.222.27.80 13.66.225.215
20.48.12.250 65.240.105.9 98.184.189.240 252.82.241.204
51.26.212.139 55.173.210.129 51.78.218.86 127.83.65.190
180.8.112.74 167.238.31.44 20.227.191.131 243.27.90.62
67.222.26.92 48.209.45.77 209.125.193.166 171.62.250.178