Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.138.213.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.138.213.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 11:45:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 58.213.138.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.213.138.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.215.192 attack
Jul 28 15:06:21 vpn01 sshd[772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.215.192
Jul 28 15:06:23 vpn01 sshd[772]: Failed password for invalid user hec from 165.22.215.192 port 47626 ssh2
...
2020-07-29 00:47:27
111.67.192.149 attack
SSH bruteforce
2020-07-29 00:39:46
123.207.78.75 attackbots
Jul 28 11:56:18 s158375 sshd[18078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.78.75
2020-07-29 00:59:15
64.227.2.96 attack
Jul 28 18:51:15 abendstille sshd\[23152\]: Invalid user supervisor from 64.227.2.96
Jul 28 18:51:15 abendstille sshd\[23152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96
Jul 28 18:51:16 abendstille sshd\[23152\]: Failed password for invalid user supervisor from 64.227.2.96 port 34346 ssh2
Jul 28 18:56:21 abendstille sshd\[28407\]: Invalid user hdfs from 64.227.2.96
Jul 28 18:56:21 abendstille sshd\[28407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96
...
2020-07-29 01:00:38
51.15.46.184 attack
2020-07-28T17:15:11.426090+02:00  sshd[15296]: Failed password for invalid user iao from 51.15.46.184 port 33874 ssh2
2020-07-29 00:41:24
222.186.175.182 attack
2020-07-28T18:19:28.544274vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:32.390064vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:35.452504vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:39.949236vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:43.443179vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
...
2020-07-29 00:46:47
58.186.51.113 attackbots
Unauthorized connection attempt from IP address 58.186.51.113 on Port 445(SMB)
2020-07-29 01:11:50
196.43.178.1 attack
Jul 28 17:03:44 marvibiene sshd[31500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.178.1 
Jul 28 17:03:45 marvibiene sshd[31500]: Failed password for invalid user oprofile from 196.43.178.1 port 43852 ssh2
2020-07-29 01:02:41
211.161.90.99 attackspam
xmlrpc attack
2020-07-29 01:09:11
5.152.0.226 attack
Automatic report - Port Scan Attack
2020-07-29 01:22:16
41.237.237.251 attackbotsspam
Port probing on unauthorized port 23
2020-07-29 00:41:56
128.199.81.66 attackbots
Jul 28 15:23:37 *hidden* sshd[32163]: Failed password for invalid user cbiuser from 128.199.81.66 port 57302 ssh2 Jul 28 16:03:23 *hidden* sshd[63238]: Invalid user wlk-lab from 128.199.81.66 port 41482 Jul 28 16:03:23 *hidden* sshd[63238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.81.66 Jul 28 16:03:25 *hidden* sshd[63238]: Failed password for invalid user wlk-lab from 128.199.81.66 port 41482 ssh2 Jul 28 16:18:59 *hidden* sshd[35976]: Invalid user andrey from 128.199.81.66 port 55164
2020-07-29 01:21:16
106.12.121.179 attackbotsspam
Jul 28 18:44:34 pornomens sshd\[11895\]: Invalid user teraria from 106.12.121.179 port 49516
Jul 28 18:44:34 pornomens sshd\[11895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.121.179
Jul 28 18:44:35 pornomens sshd\[11895\]: Failed password for invalid user teraria from 106.12.121.179 port 49516 ssh2
...
2020-07-29 01:01:20
179.108.126.114 attack
Unauthorised access (Jul 28) SRC=179.108.126.114 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=10258 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-29 01:18:57
119.45.40.87 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-07-29 01:17:21

Recently Reported IPs

77.225.79.190 33.4.124.207 69.225.77.88 217.69.67.98
122.176.36.251 51.136.178.205 187.155.158.186 93.91.70.125
211.32.31.159 63.116.14.242 107.32.104.0 148.230.128.45
204.94.245.199 220.190.18.84 255.88.132.194 149.253.202.250
24.191.125.232 121.57.58.13 91.116.102.27 130.198.151.190