Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.141.2.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.141.2.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062500 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 25 15:23:00 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 20.2.141.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.2.141.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.151.115.81 attackbotsspam
Unauthorized connection attempt detected from IP address 27.151.115.81 to port 4899 [J]
2020-01-19 18:30:38
121.151.204.105 attackspambots
Unauthorized connection attempt detected from IP address 121.151.204.105 to port 2220 [J]
2020-01-19 18:14:00
42.119.180.34 attack
Unauthorized connection attempt detected from IP address 42.119.180.34 to port 23 [J]
2020-01-19 18:28:45
118.24.81.234 attackspambots
Jan 19 10:20:08 ns37 sshd[1946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.81.234
Jan 19 10:20:11 ns37 sshd[1946]: Failed password for invalid user ef from 118.24.81.234 port 48330 ssh2
Jan 19 10:27:25 ns37 sshd[2349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.81.234
2020-01-19 18:40:12
90.68.103.36 attackbots
Unauthorized connection attempt detected from IP address 90.68.103.36 to port 23 [J]
2020-01-19 18:22:22
162.62.16.194 attackbotsspam
Unauthorized connection attempt detected from IP address 162.62.16.194 to port 43 [J]
2020-01-19 18:11:54
121.183.132.239 attack
Unauthorized connection attempt detected from IP address 121.183.132.239 to port 23 [J]
2020-01-19 18:39:19
175.136.113.190 attackspambots
Unauthorized connection attempt detected from IP address 175.136.113.190 to port 23 [J]
2020-01-19 18:10:53
139.219.0.20 attackbotsspam
Unauthorized connection attempt detected from IP address 139.219.0.20 to port 2220 [J]
2020-01-19 18:12:41
122.116.97.164 attackspam
Unauthorized connection attempt detected from IP address 122.116.97.164 to port 23 [J]
2020-01-19 18:13:37
188.136.168.123 attack
Unauthorized connection attempt detected from IP address 188.136.168.123 to port 80 [J]
2020-01-19 18:35:34
83.23.77.134 attackspambots
Unauthorized connection attempt detected from IP address 83.23.77.134 to port 23 [J]
2020-01-19 18:23:06
185.116.156.90 attackspam
Unauthorized connection attempt detected from IP address 185.116.156.90 to port 2220 [J]
2020-01-19 18:36:27
105.247.251.186 attackspam
Unauthorized connection attempt detected from IP address 105.247.251.186 to port 80 [J]
2020-01-19 18:18:52
106.13.181.68 attackbots
Jan 19 09:59:50 ns41 sshd[20565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.68
2020-01-19 18:18:21

Recently Reported IPs

85.26.232.106 23.44.224.123 192.232.82.172 199.232.82.172
185.218.84.45 116.4.203.123 66.249.75.193 10.1.1.19
2.87.23.130 107.189.21.5 10.96.40.91 206.168.34.78
45.61.169.102 2408:842c:ce43:243c:7deb:5420:ee62:a759 42.92.120.74 20.163.14.234
119.164.103.30 177.124.231.154 80.94.95.59 14.155.204.216