Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.28.54.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.28.54.57.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 140 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:15:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 57.54.28.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.54.28.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
146.242.56.23 attack
Automated reporting of port scanning
2019-09-05 04:52:37
73.220.106.130 attack
Sep  1 04:41:02 itv-usvr-01 sshd[3565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.220.106.130  user=root
Sep  1 04:41:05 itv-usvr-01 sshd[3565]: Failed password for root from 73.220.106.130 port 43954 ssh2
Sep  1 04:46:00 itv-usvr-01 sshd[3724]: Invalid user radio from 73.220.106.130
Sep  1 04:46:00 itv-usvr-01 sshd[3724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.220.106.130
Sep  1 04:46:00 itv-usvr-01 sshd[3724]: Invalid user radio from 73.220.106.130
Sep  1 04:46:01 itv-usvr-01 sshd[3724]: Failed password for invalid user radio from 73.220.106.130 port 59742 ssh2
2019-09-05 04:40:57
146.242.56.19 attack
Automated reporting of port scanning
2019-09-05 05:01:38
124.127.132.22 attackspambots
Sep  4 17:10:42 cp sshd[17351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.132.22
2019-09-05 04:59:49
157.230.92.254 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-09-05 05:07:08
23.129.64.183 attackspambots
Sep  5 01:15:02 webhost01 sshd[18597]: Failed password for root from 23.129.64.183 port 32585 ssh2
Sep  5 01:15:17 webhost01 sshd[18597]: error: maximum authentication attempts exceeded for root from 23.129.64.183 port 32585 ssh2 [preauth]
...
2019-09-05 04:58:59
68.183.91.25 attackbotsspam
Aug 30 23:29:45 itv-usvr-01 sshd[32086]: Invalid user extrim from 68.183.91.25
Aug 30 23:29:45 itv-usvr-01 sshd[32086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25
Aug 30 23:29:45 itv-usvr-01 sshd[32086]: Invalid user extrim from 68.183.91.25
Aug 30 23:29:47 itv-usvr-01 sshd[32086]: Failed password for invalid user extrim from 68.183.91.25 port 44614 ssh2
2019-09-05 05:05:11
167.99.65.138 attack
Sep  4 10:12:55 php2 sshd\[3177\]: Invalid user yale from 167.99.65.138
Sep  4 10:12:55 php2 sshd\[3177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
Sep  4 10:12:57 php2 sshd\[3177\]: Failed password for invalid user yale from 167.99.65.138 port 47412 ssh2
Sep  4 10:17:55 php2 sshd\[3721\]: Invalid user gabytzu!@\#\$%\* from 167.99.65.138
Sep  4 10:17:55 php2 sshd\[3721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
2019-09-05 04:29:01
218.98.26.173 attackspambots
Sep  4 06:10:15 debian sshd[24462]: Unable to negotiate with 218.98.26.173 port 15396: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Sep  4 16:28:38 debian sshd[22424]: Unable to negotiate with 218.98.26.173 port 49794: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2019-09-05 04:50:10
62.234.68.215 attackspam
Sep  4 07:48:25 sachi sshd\[8117\]: Invalid user postgres from 62.234.68.215
Sep  4 07:48:25 sachi sshd\[8117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.215
Sep  4 07:48:27 sachi sshd\[8117\]: Failed password for invalid user postgres from 62.234.68.215 port 53378 ssh2
Sep  4 07:51:11 sachi sshd\[8387\]: Invalid user next from 62.234.68.215
Sep  4 07:51:11 sachi sshd\[8387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.215
2019-09-05 04:25:12
106.12.16.140 attack
Sep  4 15:04:33 rpi sshd[3153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140 
Sep  4 15:04:35 rpi sshd[3153]: Failed password for invalid user neeraj from 106.12.16.140 port 54596 ssh2
2019-09-05 05:10:04
193.188.22.56 attack
OS-WINDOWS Microsoft Windows Terminal server RDP over non-standard port attempt
2019-09-05 04:28:44
69.171.206.254 attackspam
Sep  4 15:50:42 hcbbdb sshd\[10551\]: Invalid user test123 from 69.171.206.254
Sep  4 15:50:42 hcbbdb sshd\[10551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.171.206.254
Sep  4 15:50:45 hcbbdb sshd\[10551\]: Failed password for invalid user test123 from 69.171.206.254 port 15899 ssh2
Sep  4 15:58:58 hcbbdb sshd\[11477\]: Invalid user hellen from 69.171.206.254
Sep  4 15:58:58 hcbbdb sshd\[11477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.171.206.254
2019-09-05 05:02:36
76.72.8.136 attackspam
Sep  4 21:58:17 root sshd[30687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.72.8.136 
Sep  4 21:58:19 root sshd[30687]: Failed password for invalid user ex from 76.72.8.136 port 52936 ssh2
Sep  4 22:03:03 root sshd[30772]: Failed password for root from 76.72.8.136 port 41166 ssh2
...
2019-09-05 05:04:43
218.98.40.136 attackbotsspam
2019-09-04T20:30:26.002Z CLOSE host=218.98.40.136 port=62533 fd=4 time=220.144 bytes=307
...
2019-09-05 04:31:59

Recently Reported IPs

28.113.81.39 70.1.134.91 61.199.8.245 9.95.98.110
195.147.87.64 5.237.179.122 125.94.19.107 230.146.143.10
51.93.149.78 192.5.49.93 182.213.30.64 143.58.171.64
167.142.233.83 240.177.5.0 36.253.47.168 44.15.0.13
187.149.20.122 254.106.233.42 242.4.115.177 132.121.245.172