Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sallent

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.57.129.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43649
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.57.129.90.			IN	A

;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102501 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 26 07:31:51 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 90.129.57.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.129.57.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.146.1 attack
104.248.146.1 - - \[23/Nov/2019:23:44:12 +0100\] "POST /wp-login.php HTTP/1.0" 200 4474 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.146.1 - - \[23/Nov/2019:23:44:16 +0100\] "POST /wp-login.php HTTP/1.0" 200 4287 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.146.1 - - \[23/Nov/2019:23:44:18 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-24 08:17:35
185.143.221.55 attack
185.143.221.55 was recorded 30 times by 23 hosts attempting to connect to the following ports: 3391,3389,3390. Incident counter (4h, 24h, all-time): 30, 36, 977
2019-11-24 08:25:19
78.190.192.186 attackspambots
Nov 23 23:33:25 mxgate1 postfix/postscreen[26248]: CONNECT from [78.190.192.186]:63653 to [176.31.12.44]:25
Nov 23 23:33:25 mxgate1 postfix/dnsblog[26271]: addr 78.190.192.186 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 23 23:33:25 mxgate1 postfix/dnsblog[26270]: addr 78.190.192.186 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 23 23:33:25 mxgate1 postfix/dnsblog[26272]: addr 78.190.192.186 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 23 23:33:31 mxgate1 postfix/postscreen[26248]: DNSBL rank 4 for [78.190.192.186]:63653
Nov x@x
Nov 23 23:33:32 mxgate1 postfix/postscreen[26248]: HANGUP after 0.65 from [78.190.192.186]:63653 in tests after SMTP handshake
Nov 23 23:33:32 mxgate1 postfix/postscreen[26248]: DISCONNECT [78.190.192.186]:63653


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.190.192.186
2019-11-24 07:57:31
123.159.25.121 attackspam
badbot
2019-11-24 08:08:50
198.108.66.124 attack
" "
2019-11-24 08:27:34
222.186.42.4 attack
2019-11-24T01:22:06.003912scmdmz1 sshd\[23085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2019-11-24T01:22:08.368979scmdmz1 sshd\[23085\]: Failed password for root from 222.186.42.4 port 1092 ssh2
2019-11-24T01:22:15.116954scmdmz1 sshd\[23085\]: Failed password for root from 222.186.42.4 port 1092 ssh2
...
2019-11-24 08:22:29
54.37.138.172 attackspam
Nov 23 14:10:45 sachi sshd\[10154\]: Invalid user schrock from 54.37.138.172
Nov 23 14:10:45 sachi sshd\[10154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.ip-54-37-138.eu
Nov 23 14:10:48 sachi sshd\[10154\]: Failed password for invalid user schrock from 54.37.138.172 port 54272 ssh2
Nov 23 14:17:03 sachi sshd\[10627\]: Invalid user mieja from 54.37.138.172
Nov 23 14:17:03 sachi sshd\[10627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.ip-54-37-138.eu
2019-11-24 08:20:38
66.108.165.215 attackspam
Nov 24 00:20:16 SilenceServices sshd[7425]: Failed password for root from 66.108.165.215 port 50660 ssh2
Nov 24 00:23:31 SilenceServices sshd[8345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.108.165.215
Nov 24 00:23:33 SilenceServices sshd[8345]: Failed password for invalid user server from 66.108.165.215 port 58224 ssh2
2019-11-24 08:05:29
51.75.160.215 attack
Sep 28 17:14:41 vtv3 sshd[14678]: Invalid user trinity123456789 from 51.75.160.215 port 39384
Sep 28 17:14:41 vtv3 sshd[14678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:26:33 vtv3 sshd[20732]: Invalid user 1qaz2wsx from 51.75.160.215 port 45672
Sep 28 17:26:33 vtv3 sshd[20732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:26:34 vtv3 sshd[20732]: Failed password for invalid user 1qaz2wsx from 51.75.160.215 port 45672 ssh2
Sep 28 17:30:32 vtv3 sshd[22876]: Invalid user jbox from 51.75.160.215 port 57178
Sep 28 17:30:32 vtv3 sshd[22876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:42:07 vtv3 sshd[28689]: Invalid user dh from 51.75.160.215 port 35240
Sep 28 17:42:07 vtv3 sshd[28689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:42:09 vtv3 sshd[2
2019-11-24 08:24:00
124.113.218.33 attackspambots
badbot
2019-11-24 08:19:30
164.132.110.223 attackbots
Nov 24 01:08:59 vps691689 sshd[31667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.223
Nov 24 01:09:01 vps691689 sshd[31667]: Failed password for invalid user hi19810Zax from 164.132.110.223 port 58389 ssh2
...
2019-11-24 08:26:25
91.96.15.75 attackspambots
Nov 23 23:35:17 venus sshd[27296]: Invalid user pi from 91.96.15.75
Nov 23 23:35:17 venus sshd[27299]: Invalid user pi from 91.96.15.75
Nov 23 23:35:17 venus sshd[27296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.96.15.75 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.96.15.75
2019-11-24 08:07:49
45.170.174.144 attack
Automatic report - Port Scan Attack
2019-11-24 08:01:39
106.13.144.8 attackspam
Nov 24 00:34:24 lnxweb62 sshd[24066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
2019-11-24 08:29:42
51.77.137.211 attackbotsspam
Nov 24 01:03:26 SilenceServices sshd[19847]: Failed password for root from 51.77.137.211 port 56246 ssh2
Nov 24 01:07:19 SilenceServices sshd[20905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.137.211
Nov 24 01:07:21 SilenceServices sshd[20905]: Failed password for invalid user xalan from 51.77.137.211 port 57682 ssh2
2019-11-24 08:16:48

Recently Reported IPs

185.215.151.100 186.26.117.80 153.150.52.12 78.99.141.118
155.94.248.194 75.162.234.84 119.53.70.0 27.145.86.105
103.78.252.89 93.152.172.209 23.237.74.98 176.33.72.85
3.1.150.149 45.228.189.193 67.205.141.168 82.200.233.4
77.236.227.254 182.93.94.80 1.20.178.145 47.11.131.169