City: San Jose
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 57.0.0.0 - 57.255.255.255
CIDR: 57.0.0.0/8
NetName: RIPE-ERX-57
NetHandle: NET-57-0-0-0-1
Parent: ()
NetType: Early Registrations, Maintained by RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 1993-06-21
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/57.0.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.141.2.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.141.2.57. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051901 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 09:52:30 CST 2026
;; MSG SIZE rcvd: 104
Host 57.2.141.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 57.2.141.57.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 201.46.29.48 | attackbotsspam | 3389BruteforceFW23 |
2019-07-25 03:11:13 |
| 153.36.236.35 | attack | 2019-07-24T19:19:22.584801abusebot-2.cloudsearch.cf sshd\[4071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35 user=root |
2019-07-25 03:39:56 |
| 198.55.103.47 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: 198.55.103.47.static.quadranet.com. |
2019-07-25 03:44:18 |
| 197.249.52.210 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-27/07-24]10pkt,1pt.(tcp) |
2019-07-25 03:15:31 |
| 80.93.123.107 | attackbotsspam | 23/tcp 2323/tcp 23/tcp [2019-07-05/24]3pkt |
2019-07-25 03:41:56 |
| 195.154.199.185 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: 195-154-199-185.rev.poneytelecom.eu. |
2019-07-25 03:14:36 |
| 77.247.108.147 | attackspam | *Port Scan* detected from 77.247.108.147 (NL/Netherlands/-). 4 hits in the last 151 seconds |
2019-07-25 03:34:19 |
| 218.92.0.187 | attackspam | Jul 24 19:28:32 sshgateway sshd\[7005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187 user=root Jul 24 19:28:34 sshgateway sshd\[7005\]: Failed password for root from 218.92.0.187 port 57534 ssh2 Jul 24 19:28:45 sshgateway sshd\[7008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187 user=root |
2019-07-25 03:47:51 |
| 83.239.4.214 | attack | 445/tcp 445/tcp 445/tcp... [2019-06-11/07-24]4pkt,1pt.(tcp) |
2019-07-25 03:28:30 |
| 103.24.179.35 | attackbotsspam | Jul 24 21:17:38 eventyay sshd[5995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.24.179.35 Jul 24 21:17:40 eventyay sshd[5995]: Failed password for invalid user mysql from 103.24.179.35 port 33338 ssh2 Jul 24 21:21:29 eventyay sshd[6985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.24.179.35 ... |
2019-07-25 03:25:21 |
| 104.236.142.36 | attackspambots | schuetzenmusikanten.de 104.236.142.36 \[24/Jul/2019:18:44:18 +0200\] "POST /wp-login.php HTTP/1.1" 200 5684 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" schuetzenmusikanten.de 104.236.142.36 \[24/Jul/2019:18:44:21 +0200\] "POST /wp-login.php HTTP/1.1" 200 5650 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-25 03:49:09 |
| 213.92.206.227 | attackbots | " " |
2019-07-25 03:45:07 |
| 183.178.6.82 | attackbotsspam | 5555/tcp 60001/tcp 5555/tcp [2019-07-05/24]3pkt |
2019-07-25 03:36:39 |
| 191.252.58.208 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-05-26/07-24]13pkt,1pt.(tcp) |
2019-07-25 03:06:58 |
| 188.68.242.179 | attack | 445/tcp 445/tcp [2019-07-17/24]2pkt |
2019-07-25 03:08:04 |