Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.208.244.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.208.244.52.			IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 17:52:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
52.244.208.13.in-addr.arpa domain name pointer ec2-13-208-244-52.ap-northeast-3.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.244.208.13.in-addr.arpa	name = ec2-13-208-244-52.ap-northeast-3.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.230.14.146 attackbotsspam
firewall-block, port(s): 8682/tcp, 59808/tcp
2020-10-01 14:11:41
192.241.208.139 attack
IP 192.241.208.139 attacked honeypot on port: 992 at 9/30/2020 7:36:47 PM
2020-10-01 13:34:46
115.231.231.3 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-01 13:46:13
49.232.8.218 attackbotsspam
Invalid user sshuser from 49.232.8.218 port 54574
2020-10-01 13:59:49
185.228.133.4 attack
Oct  1 05:40:22 vm1 sshd[4494]: Failed password for root from 185.228.133.4 port 27498 ssh2
...
2020-10-01 13:45:13
20.191.88.144 attack
Oct  1 05:35:42 ajax sshd[15075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.191.88.144 
Oct  1 05:35:44 ajax sshd[15075]: Failed password for invalid user user2 from 20.191.88.144 port 54534 ssh2
2020-10-01 13:40:42
92.222.180.221 attackbots
2020-09-30T23:49:39.389285linuxbox-skyline sshd[233282]: Invalid user gitlab from 92.222.180.221 port 53934
...
2020-10-01 14:04:23
27.207.8.34 attackbots
23/tcp
[2020-09-30]1pkt
2020-10-01 14:09:42
103.44.253.18 attackspam
Invalid user oracle from 103.44.253.18 port 51010
2020-10-01 14:01:59
177.8.166.53 attackbotsspam
Sep 30 17:37:58 askasleikir sshd[135775]: Failed password for invalid user 888888 from 177.8.166.53 port 9663 ssh2
2020-10-01 13:43:35
203.128.78.61 attackspam
Sep 30 22:40:37 ns3164893 sshd[12006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.78.61
Sep 30 22:40:39 ns3164893 sshd[12006]: Failed password for invalid user tech from 203.128.78.61 port 53465 ssh2
...
2020-10-01 13:48:46
180.76.185.121 attackbots
Invalid user samba from 180.76.185.121 port 44572
2020-10-01 14:15:12
128.199.123.0 attack
Oct  1 11:09:06 lunarastro sshd[1777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.0 
Oct  1 11:09:08 lunarastro sshd[1777]: Failed password for invalid user library from 128.199.123.0 port 40608 ssh2
2020-10-01 14:15:37
81.68.77.53 attack
Port scan denied
2020-10-01 14:10:44
119.250.154.240 attackbots
(sshd) Failed SSH login from 119.250.154.240 (CN/China/-): 5 in the last 3600 secs
2020-10-01 13:37:45

Recently Reported IPs

138.122.194.178 219.241.70.245 92.119.82.190 128.90.50.136
128.90.105.16 149.18.57.183 149.18.29.97 38.22.104.239
38.44.88.177 149.57.14.97 71.246.244.117 175.112.167.153
87.236.176.152 75.119.140.163 80.51.66.94 103.203.59.14
117.30.235.95 111.224.136.20 112.65.26.55 128.90.160.101