Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.140.224.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.140.224.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:29:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
57.224.140.13.in-addr.arpa domain name pointer 39.e0.8c0d.ip4.static.sl-reverse.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.224.140.13.in-addr.arpa	name = 39.e0.8c0d.ip4.static.sl-reverse.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
90.68.103.36 attackspambots
port scan and connect, tcp 23 (telnet)
2019-12-22 13:10:17
164.132.102.168 attackbots
Dec 22 00:00:38 ny01 sshd[30295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.102.168
Dec 22 00:00:40 ny01 sshd[30295]: Failed password for invalid user shimada from 164.132.102.168 port 54172 ssh2
Dec 22 00:05:34 ny01 sshd[30850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.102.168
2019-12-22 13:17:04
59.51.65.17 attack
SSH invalid-user multiple login try
2019-12-22 13:05:20
120.6.178.223 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-22 13:31:21
221.157.203.236 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-22 13:08:28
114.25.23.91 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-12-2019 04:55:14.
2019-12-22 13:28:47
150.95.83.93 attack
Dec 22 05:52:16 dcd-gentoo sshd[21303]: Invalid user zabbix from 150.95.83.93 port 57940
Dec 22 05:53:53 dcd-gentoo sshd[21352]: Invalid user zabbix from 150.95.83.93 port 60166
Dec 22 05:55:29 dcd-gentoo sshd[21411]: Invalid user john from 150.95.83.93 port 34160
...
2019-12-22 13:12:48
103.82.223.206 attack
Automatic report - Port Scan Attack
2019-12-22 13:35:53
49.88.112.63 attackspam
Dec 21 19:14:53 sachi sshd\[23333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.63  user=root
Dec 21 19:14:56 sachi sshd\[23333\]: Failed password for root from 49.88.112.63 port 19177 ssh2
Dec 21 19:14:58 sachi sshd\[23333\]: Failed password for root from 49.88.112.63 port 19177 ssh2
Dec 21 19:15:02 sachi sshd\[23333\]: Failed password for root from 49.88.112.63 port 19177 ssh2
Dec 21 19:15:12 sachi sshd\[23362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.63  user=root
2019-12-22 13:21:39
64.39.102.153 attack
25 attempts against mh-misbehave-ban on milky.magehost.pro
2019-12-22 13:02:21
106.12.74.238 attackspam
ssh failed login
2019-12-22 13:00:55
218.92.0.141 attack
Dec 22 05:55:36 jane sshd[15113]: Failed password for root from 218.92.0.141 port 14917 ssh2
Dec 22 05:55:40 jane sshd[15113]: Failed password for root from 218.92.0.141 port 14917 ssh2
...
2019-12-22 13:03:09
187.178.64.209 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-22 13:06:57
86.102.175.6 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2019-12-22 13:15:42
14.37.38.213 attackspambots
$f2bV_matches
2019-12-22 13:13:02

Recently Reported IPs

125.80.43.245 82.230.32.125 31.128.166.14 237.85.56.193
29.17.201.2 233.149.236.27 156.214.229.82 107.193.8.63
169.245.61.79 206.91.53.41 104.24.145.73 161.153.16.14
131.14.177.212 37.135.107.134 8.148.170.141 55.123.169.216
56.192.11.54 119.210.206.133 79.239.203.137 70.17.166.193