Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.117.157.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.117.157.54.			IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110100 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 01 17:58:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.157.117.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.157.117.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.195 attack
Aug 15 00:34:36 pkdns2 sshd\[59172\]: Failed password for root from 112.85.42.195 port 46243 ssh2Aug 15 00:35:23 pkdns2 sshd\[59246\]: Failed password for root from 112.85.42.195 port 25917 ssh2Aug 15 00:36:13 pkdns2 sshd\[59270\]: Failed password for root from 112.85.42.195 port 52660 ssh2Aug 15 00:37:05 pkdns2 sshd\[59291\]: Failed password for root from 112.85.42.195 port 37726 ssh2Aug 15 00:37:54 pkdns2 sshd\[59310\]: Failed password for root from 112.85.42.195 port 10436 ssh2Aug 15 00:38:42 pkdns2 sshd\[59339\]: Failed password for root from 112.85.42.195 port 41233 ssh2
...
2020-08-15 05:43:40
87.116.179.227 attackbots
87.116.179.227 - [15/Aug/2020:00:03:29 +0300] "POST /wp-login.php HTTP/1.1" 403 4030 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
87.116.179.227 - [15/Aug/2020:00:04:30 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
87.116.179.227 - [15/Aug/2020:00:05:31 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
87.116.179.227 - [15/Aug/2020:00:10:25 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
87.116.179.227 - [15/Aug/2020:00:11:25 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-08-15 05:23:31
222.186.169.194 attackspambots
[MK-Root1] SSH login failed
2020-08-15 05:26:03
222.186.42.213 attack
Aug 14 23:03:22 * sshd[7536]: Failed password for root from 222.186.42.213 port 38987 ssh2
2020-08-15 05:18:17
45.129.33.24 attack
Excessive Port-Scanning
2020-08-15 05:19:03
198.98.49.181 attackspambots
2020-08-14T21:02:10.456771shield sshd\[5196\]: Invalid user postgres from 198.98.49.181 port 48672
2020-08-14T21:02:10.461326shield sshd\[5194\]: Invalid user oracle from 198.98.49.181 port 48666
2020-08-14T21:02:10.463517shield sshd\[5197\]: Invalid user alfresco from 198.98.49.181 port 48686
2020-08-14T21:02:10.465084shield sshd\[5192\]: Invalid user jenkins from 198.98.49.181 port 48682
2020-08-14T21:02:10.467955shield sshd\[5195\]: Invalid user centos from 198.98.49.181 port 48674
2020-08-15 05:13:51
217.182.23.55 attackspambots
Aug 14 22:41:00 ip40 sshd[907]: Failed password for root from 217.182.23.55 port 41102 ssh2
...
2020-08-15 05:24:20
123.31.26.144 attackspam
Aug 14 22:56:59 OPSO sshd\[2474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.26.144  user=root
Aug 14 22:57:01 OPSO sshd\[2474\]: Failed password for root from 123.31.26.144 port 12219 ssh2
Aug 14 23:00:05 OPSO sshd\[3302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.26.144  user=root
Aug 14 23:00:07 OPSO sshd\[3302\]: Failed password for root from 123.31.26.144 port 54165 ssh2
Aug 14 23:03:02 OPSO sshd\[3837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.26.144  user=root
2020-08-15 05:12:39
45.119.212.105 attack
Aug 14 21:22:41 django-0 sshd[32400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.212.105 
Aug 14 21:22:41 django-0 sshd[32400]: Invalid user admin from 45.119.212.105
Aug 14 21:22:42 django-0 sshd[32400]: Failed password for invalid user admin from 45.119.212.105 port 46782 ssh2
...
2020-08-15 05:22:45
178.154.200.127 attackbotsspam
\[Fri Aug 14 22:44:04.529308 2020\] \[access_compat:error\] \[pid 27760:tid 140226840188672\] \[client 178.154.200.127:56728\] AH01797: client denied by server configuration: /web/auskunft-vom-anwalt/www/htdocs_cms/robots.txt
\[Fri Aug 14 22:44:04.584122 2020\] \[access_compat:error\] \[pid 27760:tid 140226924115712\] \[client 178.154.200.127:56748\] AH01797: client denied by server configuration: /web/auskunft-vom-anwalt/www/htdocs_cms/robots.txt
\[Fri Aug 14 22:44:08.336727 2020\] \[access_compat:error\] \[pid 27760:tid 140226773047040\] \[client 178.154.200.127:56748\] AH01797: client denied by server configuration: /web/auskunft-vom-anwalt/www/htdocs_cms/
...
2020-08-15 05:32:31
125.91.109.200 attackspambots
2020-08-14T21:18:42.099647shield sshd\[6939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.109.200  user=root
2020-08-14T21:18:43.969219shield sshd\[6939\]: Failed password for root from 125.91.109.200 port 49724 ssh2
2020-08-14T21:23:05.535223shield sshd\[7346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.109.200  user=root
2020-08-14T21:23:07.514540shield sshd\[7346\]: Failed password for root from 125.91.109.200 port 60724 ssh2
2020-08-14T21:27:24.132723shield sshd\[7781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.109.200  user=root
2020-08-15 05:35:21
61.144.173.147 attackspambots
Aug 13 22:24:49 mail1 sshd[24190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.173.147  user=r.r
Aug 13 22:24:51 mail1 sshd[24190]: Failed password for r.r from 61.144.173.147 port 4168 ssh2
Aug 13 22:24:51 mail1 sshd[24190]: Received disconnect from 61.144.173.147 port 4168:11: Bye Bye [preauth]
Aug 13 22:24:51 mail1 sshd[24190]: Disconnected from 61.144.173.147 port 4168 [preauth]
Aug 13 22:33:59 mail1 sshd[24566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.173.147  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.144.173.147
2020-08-15 05:31:27
61.164.213.198 attackbots
$f2bV_matches
2020-08-15 05:30:55
121.229.6.166 attackspam
Aug 14 22:43:54 rancher-0 sshd[1086357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.6.166  user=root
Aug 14 22:43:56 rancher-0 sshd[1086357]: Failed password for root from 121.229.6.166 port 40200 ssh2
...
2020-08-15 05:45:14
117.232.127.51 attackbots
Aug 14 22:43:56 ns37 sshd[13931]: Failed password for root from 117.232.127.51 port 42874 ssh2
Aug 14 22:43:56 ns37 sshd[13931]: Failed password for root from 117.232.127.51 port 42874 ssh2
2020-08-15 05:44:32

Recently Reported IPs

79.37.197.238 120.52.207.212 112.195.220.33 198.211.99.76
217.20.60.154 198.211.99.114 222.10.239.4 198.211.99.239
45.141.86.32 219.128.130.113 203.76.99.82 89.211.245.131
226.160.14.5 91.120.218.172 232.254.60.100 92.28.247.129
252.245.194.208 155.157.98.108 213.139.75.181 88.214.25.14