Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.53.123.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.53.123.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 01:41:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 137.123.53.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.123.53.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.141.220.160 attackbots
23/tcp
[2019-10-25]1pkt
2019-10-25 15:51:57
106.13.37.221 attack
Oct 25 05:42:33 apollo sshd\[4269\]: Invalid user pc from 106.13.37.221Oct 25 05:42:35 apollo sshd\[4269\]: Failed password for invalid user pc from 106.13.37.221 port 34414 ssh2Oct 25 05:53:24 apollo sshd\[4298\]: Failed password for root from 106.13.37.221 port 47652 ssh2
...
2019-10-25 15:20:12
49.88.112.71 attack
Oct 25 09:23:29 MK-Soft-VM6 sshd[10339]: Failed password for root from 49.88.112.71 port 26169 ssh2
Oct 25 09:23:33 MK-Soft-VM6 sshd[10339]: Failed password for root from 49.88.112.71 port 26169 ssh2
...
2019-10-25 15:40:36
41.84.238.17 attackbots
2323/tcp
[2019-10-25]1pkt
2019-10-25 15:15:22
61.246.140.23 attackspam
port scan and connect, tcp 5432 (postgresql)
2019-10-25 15:46:53
36.236.188.13 attackspam
23/tcp
[2019-10-25]1pkt
2019-10-25 15:52:45
1.34.76.230 attackspam
Automatic report - Banned IP Access
2019-10-25 15:51:20
35.201.243.170 attack
Oct 24 21:08:52 kapalua sshd\[3296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.243.201.35.bc.googleusercontent.com  user=root
Oct 24 21:08:55 kapalua sshd\[3296\]: Failed password for root from 35.201.243.170 port 34162 ssh2
Oct 24 21:12:20 kapalua sshd\[3708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.243.201.35.bc.googleusercontent.com  user=root
Oct 24 21:12:22 kapalua sshd\[3708\]: Failed password for root from 35.201.243.170 port 14202 ssh2
Oct 24 21:15:56 kapalua sshd\[3985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.243.201.35.bc.googleusercontent.com  user=root
2019-10-25 15:38:13
58.152.44.139 attack
5555/tcp
[2019-10-25]1pkt
2019-10-25 15:41:31
51.83.41.76 attackspambots
Invalid user mech from 51.83.41.76 port 39890
2019-10-25 15:28:59
211.252.84.191 attackbots
(sshd) Failed SSH login from 211.252.84.191 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 25 07:09:56 server2 sshd[19991]: Invalid user testuser from 211.252.84.191 port 48738
Oct 25 07:09:58 server2 sshd[19991]: Failed password for invalid user testuser from 211.252.84.191 port 48738 ssh2
Oct 25 07:20:31 server2 sshd[20246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.84.191  user=root
Oct 25 07:20:33 server2 sshd[20246]: Failed password for root from 211.252.84.191 port 41876 ssh2
Oct 25 07:24:56 server2 sshd[20310]: Invalid user abdull from 211.252.84.191 port 57844
2019-10-25 15:14:56
42.117.20.48 attackspambots
Telnetd brute force attack detected by fail2ban
2019-10-25 15:32:27
125.27.40.92 attack
445/tcp
[2019-10-25]1pkt
2019-10-25 15:34:54
142.93.222.197 attackbots
2019-10-25T07:04:30.674408abusebot-4.cloudsearch.cf sshd\[5374\]: Invalid user kathi from 142.93.222.197 port 48786
2019-10-25 15:50:08
118.193.31.20 attackspambots
Oct 24 20:51:38 friendsofhawaii sshd\[22019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20  user=root
Oct 24 20:51:41 friendsofhawaii sshd\[22019\]: Failed password for root from 118.193.31.20 port 60812 ssh2
Oct 24 20:57:05 friendsofhawaii sshd\[22444\]: Invalid user gate from 118.193.31.20
Oct 24 20:57:05 friendsofhawaii sshd\[22444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20
Oct 24 20:57:07 friendsofhawaii sshd\[22444\]: Failed password for invalid user gate from 118.193.31.20 port 43188 ssh2
2019-10-25 15:40:16

Recently Reported IPs

186.199.124.24 128.67.122.68 104.135.164.143 83.253.127.84
83.10.32.7 130.79.163.95 189.112.122.223 108.208.30.251
134.138.239.238 146.94.97.11 97.143.30.220 157.230.40.157
214.157.155.19 136.143.230.63 176.181.4.24 193.60.206.150
195.9.109.144 153.101.112.184 22.222.220.170 244.159.6.190