Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.132.85.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.132.85.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:48:01 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 43.85.132.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.85.132.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.241.58.211 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:26.
2019-09-28 04:56:10
122.195.200.148 attackbots
Sep 27 23:11:49 herz-der-gamer sshd[32548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
Sep 27 23:11:51 herz-der-gamer sshd[32548]: Failed password for root from 122.195.200.148 port 31220 ssh2
Sep 27 23:11:54 herz-der-gamer sshd[32548]: Failed password for root from 122.195.200.148 port 31220 ssh2
...
2019-09-28 05:20:19
159.203.201.38 attack
09/27/2019-23:11:59.972747 159.203.201.38 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-28 05:14:53
113.190.40.112 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:30.
2019-09-28 04:53:19
203.128.242.166 attackbots
Sep 27 15:16:51 web8 sshd\[13900\]: Invalid user atu from 203.128.242.166
Sep 27 15:16:51 web8 sshd\[13900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166
Sep 27 15:16:53 web8 sshd\[13900\]: Failed password for invalid user atu from 203.128.242.166 port 54167 ssh2
Sep 27 15:21:18 web8 sshd\[16000\]: Invalid user admin from 203.128.242.166
Sep 27 15:21:18 web8 sshd\[16000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166
2019-09-28 04:39:45
118.96.138.242 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:36.
2019-09-28 04:45:27
94.79.181.162 attackbotsspam
Sep 27 18:46:43 vps691689 sshd[18311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.79.181.162
Sep 27 18:46:44 vps691689 sshd[18311]: Failed password for invalid user admin from 94.79.181.162 port 52237 ssh2
...
2019-09-28 04:39:12
117.60.81.73 attack
firewall-block, port(s): 22/tcp
2019-09-28 04:51:39
119.28.84.97 attack
Sep 27 21:11:49 lnxded63 sshd[23309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.84.97
2019-09-28 05:08:38
62.234.108.63 attackbotsspam
2019-09-27T23:53:53.241385tmaserv sshd\[27214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.63
2019-09-27T23:53:55.070832tmaserv sshd\[27214\]: Failed password for invalid user rt from 62.234.108.63 port 40633 ssh2
2019-09-28T00:07:11.989002tmaserv sshd\[30539\]: Invalid user voorde from 62.234.108.63 port 40974
2019-09-28T00:07:11.993956tmaserv sshd\[30539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.63
2019-09-28T00:07:14.041016tmaserv sshd\[30539\]: Failed password for invalid user voorde from 62.234.108.63 port 40974 ssh2
2019-09-28T00:11:40.933305tmaserv sshd\[30783\]: Invalid user backupadmin from 62.234.108.63 port 59910
...
2019-09-28 05:18:44
39.67.56.125 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/39.67.56.125/ 
 CN - 1H : (1128)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 39.67.56.125 
 
 CIDR : 39.64.0.0/11 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 WYKRYTE ATAKI Z ASN4837 :  
  1H - 18 
  3H - 57 
  6H - 106 
 12H - 224 
 24H - 499 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-28 05:15:52
142.93.251.1 attack
Sep 27 22:51:03 v22019058497090703 sshd[9721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1
Sep 27 22:51:04 v22019058497090703 sshd[9721]: Failed password for invalid user 4tech2 from 142.93.251.1 port 45346 ssh2
Sep 27 22:55:07 v22019058497090703 sshd[10034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1
...
2019-09-28 05:05:50
54.37.69.74 attackspambots
Sep 27 22:53:31 dedicated sshd[11484]: Invalid user ipass from 54.37.69.74 port 46554
2019-09-28 05:10:43
176.36.208.138 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-09-28 04:40:26
212.0.155.150 attackspambots
Reported by AbuseIPDB proxy server.
2019-09-28 04:42:21

Recently Reported IPs

214.41.22.101 151.33.7.150 60.112.38.24 114.188.86.44
174.129.171.132 223.174.209.212 240.241.220.163 215.10.59.84
134.122.217.144 177.60.220.190 177.11.99.219 29.122.142.26
255.110.235.65 180.20.1.165 168.7.144.132 237.30.16.210
132.114.117.57 213.148.29.153 50.41.156.138 30.151.207.70