Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Facebook, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
157.240.241.35 spambotsattackproxynormal
157.240.241.35
2023-04-23 13:12:39
157.240.241.35 spambotsattackproxynormal
157.240.241.35
2023-04-23 13:12:31
157.240.20.15 attackspam
unauthorized connection attempt
2020-02-26 14:54:11
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.240.2.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21249
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.240.2.20.			IN	A

;; AUTHORITY SECTION:
.			3534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040903 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 10 11:33:10 +08 2019
;; MSG SIZE  rcvd: 116

Host info
20.2.240.157.in-addr.arpa domain name pointer edge-star-shv-01-ort2.facebook.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
20.2.240.157.in-addr.arpa	name = edge-star-shv-01-ort2.facebook.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
198.46.154.18 attackbotsspam
\[2019-10-22 06:03:30\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T06:03:30.180-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01148221530442",SessionID="0x7f6130477218",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/198.46.154.18/60190",ACLName="no_extension_match"
\[2019-10-22 06:03:43\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T06:03:43.542-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0048221530441",SessionID="0x7f613013d028",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/198.46.154.18/49425",ACLName="no_extension_match"
\[2019-10-22 06:04:04\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T06:04:04.068-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01148221530439",SessionID="0x7f61303c1848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/198.46.154.18/60468",ACLName="no_extensi
2019-10-22 18:47:36
13.52.93.222 attackspam
$f2bV_matches_ltvn
2019-10-22 18:24:42
123.1.187.49 attack
$f2bV_matches
2019-10-22 18:40:14
167.71.201.242 attackbots
UTC: 2019-10-21 port: 17/udp
2019-10-22 18:22:01
190.25.189.178 attackspambots
$f2bV_matches
2019-10-22 18:35:18
62.234.55.241 attackspambots
Oct 22 12:32:20 tuxlinux sshd[39367]: Invalid user hadoop from 62.234.55.241 port 45478
Oct 22 12:32:20 tuxlinux sshd[39367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.55.241 
Oct 22 12:32:20 tuxlinux sshd[39367]: Invalid user hadoop from 62.234.55.241 port 45478
Oct 22 12:32:20 tuxlinux sshd[39367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.55.241 
Oct 22 12:32:20 tuxlinux sshd[39367]: Invalid user hadoop from 62.234.55.241 port 45478
Oct 22 12:32:20 tuxlinux sshd[39367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.55.241 
Oct 22 12:32:23 tuxlinux sshd[39367]: Failed password for invalid user hadoop from 62.234.55.241 port 45478 ssh2
...
2019-10-22 18:33:07
85.192.179.171 attack
$f2bV_matches
2019-10-22 18:39:29
133.167.100.109 attackbots
2019-10-22T12:02:57.737283scmdmz1 sshd\[19512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=os3-380-23105.vs.sakura.ne.jp  user=root
2019-10-22T12:03:00.240307scmdmz1 sshd\[19512\]: Failed password for root from 133.167.100.109 port 48408 ssh2
2019-10-22T12:07:02.078379scmdmz1 sshd\[20064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=os3-380-23105.vs.sakura.ne.jp  user=root
...
2019-10-22 18:11:07
178.73.215.171 attack
[connect count:2 time(s)][SMTP/25/465/587 Probe]

in blocklist.de:"listed [mail]"
in spfbl.net:"listed"
*(10221154)
2019-10-22 18:30:32
185.25.123.156 attackbots
2019-10-11	06:40:06	185.25.123.156	karthikshereen@143gmail.com	newshosting@mydomain.com		dnsbl	reject RCPT: 550 5.7.1 Service unavailable; client [185.25.123.156] blocked using zen.spamhaus.org
2019-10-22 18:38:37
2605:6400:300:3::2 attack
WordPress wp-login brute force :: 2605:6400:300:3::2 0.048 BYPASS [22/Oct/2019:19:49:08  1100] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-22 18:23:20
45.95.168.150 attack
CloudCIX Reconnaissance Scan Detected, PTR: maxko-hosting.com.
2019-10-22 18:21:11
36.105.25.11 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 18:36:18
46.101.175.163 attackbots
Connection by 46.101.175.163 on port: 23 got caught by honeypot at 10/22/2019 3:49:42 AM
2019-10-22 18:32:19
200.89.178.11 attackspam
$f2bV_matches
2019-10-22 18:42:25

Recently Reported IPs

139.59.42.75 110.137.178.101 103.23.35.18 14.167.59.246
119.146.144.118 109.174.80.2 125.129.92.96 120.92.102.121
151.80.246.221 195.29.92.172 163.172.170.222 199.244.49.220
172.69.226.14 136.233.8.100 36.89.251.107 125.76.246.6
82.56.31.201 167.99.145.227 103.200.40.194 121.34.33.241