Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.117.104.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.117.104.57.			IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:48:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 57.104.117.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.104.117.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.66.79.132 attackspambots
Unauthorized connection attempt from IP address 103.66.79.132 on Port 445(SMB)
2020-03-03 04:23:07
194.26.29.130 attack
Mar  2 21:05:26 debian-2gb-nbg1-2 kernel: \[5438707.954344\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=4329 PROTO=TCP SPT=8080 DPT=8495 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-03 04:13:55
177.190.176.41 attackbotsspam
Unauthorized connection attempt detected from IP address 177.190.176.41 to port 8080 [J]
2020-03-03 04:10:36
5.133.62.101 attack
(imapd) Failed IMAP login from 5.133.62.101 (IT/Italy/-): 1 in the last 3600 secs
2020-03-03 04:16:33
78.37.70.230 attackspambots
Mar  2 20:42:42 vpn01 sshd[8421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.37.70.230
Mar  2 20:42:44 vpn01 sshd[8421]: Failed password for invalid user test from 78.37.70.230 port 45340 ssh2
...
2020-03-03 03:56:03
123.199.0.4 attackbotsspam
" "
2020-03-03 03:56:48
128.199.186.61 attackspam
Mar  2 14:34:06 * sshd[19937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.186.61
Mar  2 14:34:08 * sshd[19937]: Failed password for invalid user chengm from 128.199.186.61 port 45518 ssh2
2020-03-03 04:00:56
183.132.74.164 attack
Unauthorized connection attempt detected from IP address 183.132.74.164 to port 23 [J]
2020-03-03 04:09:14
218.92.0.173 attackbotsspam
Mar  2 20:51:00 minden010 sshd[6453]: Failed password for root from 218.92.0.173 port 24490 ssh2
Mar  2 20:51:03 minden010 sshd[6453]: Failed password for root from 218.92.0.173 port 24490 ssh2
Mar  2 20:51:06 minden010 sshd[6453]: Failed password for root from 218.92.0.173 port 24490 ssh2
Mar  2 20:51:10 minden010 sshd[6453]: Failed password for root from 218.92.0.173 port 24490 ssh2
...
2020-03-03 04:05:17
222.186.180.147 attack
Mar  2 23:16:29 server sshd\[1545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Mar  2 23:16:31 server sshd\[1545\]: Failed password for root from 222.186.180.147 port 37300 ssh2
Mar  2 23:16:34 server sshd\[1545\]: Failed password for root from 222.186.180.147 port 37300 ssh2
Mar  2 23:16:38 server sshd\[1545\]: Failed password for root from 222.186.180.147 port 37300 ssh2
Mar  2 23:16:41 server sshd\[1545\]: Failed password for root from 222.186.180.147 port 37300 ssh2
...
2020-03-03 04:18:46
173.213.80.160 spam
MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord, en TOTALE INFRACTION avec les Législations Européennes comme Française sur la RGPD, donc à condamner à 750 € par pourriel émis, et tout ça pour du CUL, du SEXE...
From: Victoria 

Message-Id: 

scovarrubias@ndi.cl => 173.213.80.160

ndi.cl => 173.213.80.162

https://www.mywot.com/scorecard/ndi.cl

https://en.asytech.cn/report-ip/173.213.80.160

https://en.asytech.cn/report-ip/173.213.80.162
2020-03-03 03:44:23
114.34.215.185 attack
Unauthorized connection attempt detected from IP address 114.34.215.185 to port 23 [J]
2020-03-03 04:14:37
158.69.194.115 attackspam
Mar  2 20:25:32 vpn01 sshd[8003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
Mar  2 20:25:34 vpn01 sshd[8003]: Failed password for invalid user cat from 158.69.194.115 port 57815 ssh2
...
2020-03-03 04:24:28
188.65.89.59 attackspam
Unauthorized connection attempt detected from IP address 188.65.89.59 to port 23 [J]
2020-03-03 04:06:05
185.47.65.30 attackspambots
Mar  3 00:11:08 areeb-Workstation sshd[10813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.65.30 
Mar  3 00:11:10 areeb-Workstation sshd[10813]: Failed password for invalid user bt1944server from 185.47.65.30 port 38840 ssh2
...
2020-03-03 03:48:11

Recently Reported IPs

137.117.107.191 137.117.106.206 137.117.11.122 137.117.11.156
137.117.143.199 137.117.109.118 137.117.146.106 137.117.146.91
137.117.150.110 137.117.149.204 137.117.148.100 137.117.157.88
137.117.159.91 137.117.16.226 137.117.160.111 137.117.168.133
137.117.166.35 137.117.17.70 137.117.161.83 137.117.172.209