Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.14.140.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.14.140.51.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:18:01 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 51.140.14.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.140.14.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.48.16.14 attackspambots
Unauthorized connection attempt from IP address 181.48.16.14 on Port 445(SMB)
2020-09-05 01:59:48
161.35.84.204 attackbots
Port scan denied
2020-09-05 02:05:02
117.239.184.2 attackbotsspam
SMB
2020-09-05 02:00:34
85.185.83.162 attackspambots
Unauthorized connection attempt from IP address 85.185.83.162 on Port 445(SMB)
2020-09-05 01:47:56
118.27.9.23 attackbots
2020-09-04T17:16:55.226709+02:00  sshd[17758]: Failed password for root from 118.27.9.23 port 32848 ssh2
2020-09-05 01:58:14
139.99.238.150 attack
Invalid user radius from 139.99.238.150 port 40340
2020-09-05 01:27:22
102.41.152.146 attack
Invalid user test1 from 102.41.152.146 port 1843
2020-09-05 01:42:30
41.233.49.36 attackbotsspam
Port probing on unauthorized port 5501
2020-09-05 01:35:52
157.44.169.117 attack
Unauthorized connection attempt from IP address 157.44.169.117 on Port 445(SMB)
2020-09-05 01:44:53
141.136.95.175 attackspambots
Attempted connection to port 445.
2020-09-05 02:07:20
112.85.42.227 attackbotsspam
Sep  4 13:27:53 NPSTNNYC01T sshd[31076]: Failed password for root from 112.85.42.227 port 61052 ssh2
Sep  4 13:34:01 NPSTNNYC01T sshd[31571]: Failed password for root from 112.85.42.227 port 19057 ssh2
...
2020-09-05 02:05:57
74.219.227.194 attack
Honeypot attack, port: 445, PTR: rrcs-74-219-227-194.central.biz.rr.com.
2020-09-05 01:49:48
164.132.107.245 attackspam
$f2bV_matches
2020-09-05 01:38:53
134.122.126.136 attack
TCP port : 27017
2020-09-05 01:45:16
45.142.120.36 attack
SMTP Screen: 45.142.120.36 (unknown location): connected 11 times within 2 minutes
2020-09-05 01:28:45

Recently Reported IPs

51.40.44.71 214.194.120.138 246.246.240.90 81.109.24.137
21.95.149.68 198.63.66.203 161.210.137.161 27.241.82.123
55.31.45.222 27.43.16.176 129.192.1.60 140.255.81.2
30.249.191.84 132.101.199.68 245.165.135.76 114.162.179.205
70.107.68.21 147.83.89.119 40.153.193.69 88.114.167.88