Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.249.158.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9031
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.249.158.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 09:09:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 107.158.249.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.158.249.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.30.1.229 attackspam
[H1.VM8] Blocked by UFW
2020-10-14 09:28:21
20.52.39.93 bots
20.52.39.93 - - [20/Oct/2020:17:18:10 +0200] "GET /sites/../../../../../../../../../../etc/passwd%00.jpg/files/css/css_8sYMI9AE_UQEjbw3T7IujX9-denVBCz5b8sEnZu_seA.css HTTP/1.1" 400 182 "-" "-"
2020-10-21 16:37:03
185.63.253.205 spambotsattackproxynormal
Oke
2020-10-15 02:56:03
140.213.57.108 attackproxy
Ini orang hack akunsaya
2020-10-19 06:14:13
194.61.55.160 spamattack
Icarus honeypot on github
2020-10-20 16:23:33
78.128.113.214 attack
Brute FOrce RDP
2020-10-19 06:21:05
89.138.249.106 attackbots
Port Scan: TCP/443
2020-10-14 09:18:53
218.92.0.251 attackbotsspam
Oct 14 01:22:44 scw-6657dc sshd[28218]: Failed password for root from 218.92.0.251 port 4193 ssh2
Oct 14 01:22:44 scw-6657dc sshd[28218]: Failed password for root from 218.92.0.251 port 4193 ssh2
Oct 14 01:22:48 scw-6657dc sshd[28218]: Failed password for root from 218.92.0.251 port 4193 ssh2
...
2020-10-14 09:24:21
174.253.160.184 spambotsattackproxynormal
CRAIG COOPER  I WANT MY PHONE BACK
2020-10-21 09:58:37
79.137.50.77 attack
MYH,DEF GET /wp-login.php
2020-10-14 09:19:32
156.96.56.184 attackspambots
Bad Postfix AUTH attempts
2020-10-14 09:24:54
93.84.76.125 normal
ыв
2020-10-17 02:39:31
172.81.242.40 attackspam
(sshd) Failed SSH login from 172.81.242.40 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 13 18:35:18 server sshd[30334]: Invalid user mri from 172.81.242.40 port 47038
Oct 13 18:35:19 server sshd[30334]: Failed password for invalid user mri from 172.81.242.40 port 47038 ssh2
Oct 13 18:49:31 server sshd[1343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.242.40  user=root
Oct 13 18:49:33 server sshd[1343]: Failed password for root from 172.81.242.40 port 33556 ssh2
Oct 13 18:52:23 server sshd[2191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.242.40  user=root
2020-10-14 09:13:39
111.68.46.68 attackspambots
Oct 14 00:47:38 marvibiene sshd[9647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.46.68 
Oct 14 00:47:40 marvibiene sshd[9647]: Failed password for invalid user klement from 111.68.46.68 port 22116 ssh2
2020-10-14 09:13:22
191.235.84.120 attack
bRUTE fORCE
2020-10-15 01:25:35

Recently Reported IPs

75.189.201.63 137.110.220.127 186.71.68.83 14.43.58.151
185.31.88.163 66.50.182.104 240.251.92.30 104.245.37.210
230.136.121.40 134.107.195.249 16.128.141.158 62.218.34.33
238.198.242.184 79.113.30.111 250.36.241.180 208.184.28.198
204.71.20.218 215.159.127.222 118.160.155.208 197.255.177.110