Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.114.57.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.114.57.202.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 11:02:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 202.57.114.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.57.114.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.112.72.126 attackspambots
Jun 30 06:14:12 ncomp sshd[11994]: Invalid user uranus from 193.112.72.126
Jun 30 06:14:12 ncomp sshd[11994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.72.126
Jun 30 06:14:12 ncomp sshd[11994]: Invalid user uranus from 193.112.72.126
Jun 30 06:14:14 ncomp sshd[11994]: Failed password for invalid user uranus from 193.112.72.126 port 50508 ssh2
2019-06-30 12:59:06
165.227.97.108 attack
Jun 30 07:36:50 srv03 sshd\[32613\]: Invalid user ftp from 165.227.97.108 port 48980
Jun 30 07:36:50 srv03 sshd\[32613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.97.108
Jun 30 07:36:52 srv03 sshd\[32613\]: Failed password for invalid user ftp from 165.227.97.108 port 48980 ssh2
2019-06-30 13:53:51
36.76.217.146 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 13:17:53
113.160.37.4 attackbots
Invalid user test from 113.160.37.4 port 60886
2019-06-30 13:01:04
112.242.95.179 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 13:40:17
58.212.42.104 attackspambots
21/tcp 21/tcp 21/tcp
[2019-06-30]3pkt
2019-06-30 13:47:34
221.221.153.8 attack
Jun 30 04:44:11 debian sshd\[27367\]: Invalid user space from 221.221.153.8 port 51342
Jun 30 04:44:11 debian sshd\[27367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.221.153.8
...
2019-06-30 13:52:34
60.250.104.222 attack
SMB Server BruteForce Attack
2019-06-30 13:07:48
103.245.195.202 attackspam
23/tcp
[2019-06-30]1pkt
2019-06-30 13:51:17
185.44.231.63 attackbotsspam
Automatic report - Web App Attack
2019-06-30 13:23:21
88.248.15.4 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-06-30 13:22:35
103.229.183.213 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-30 13:06:35
174.138.56.93 attackbotsspam
FTP Brute-Force reported by Fail2Ban
2019-06-30 13:48:50
123.14.5.115 attackbots
Invalid user steamcmd from 123.14.5.115 port 58076
2019-06-30 13:49:16
36.239.80.151 attackspambots
37215/tcp
[2019-06-30]1pkt
2019-06-30 13:50:50

Recently Reported IPs

83.124.208.171 171.239.132.140 141.111.149.205 52.170.67.223
243.210.8.90 189.76.228.167 127.234.237.7 78.82.122.12
66.112.176.200 91.194.28.113 225.44.253.43 28.158.36.7
19.246.2.111 30.56.105.148 175.164.248.189 237.6.88.58
74.115.135.55 30.176.169.183 252.248.120.4 186.160.68.208