Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.52.248.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.52.248.40.			IN	A

;; AUTHORITY SECTION:
.			245	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:06:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
40.248.52.13.in-addr.arpa domain name pointer ec2-13-52-248-40.us-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.248.52.13.in-addr.arpa	name = ec2-13-52-248-40.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.114 attackspam
Apr 27 06:50:16 mout sshd[20539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Apr 27 06:50:18 mout sshd[20539]: Failed password for root from 49.88.112.114 port 57066 ssh2
2020-04-27 13:24:32
138.68.48.118 attackbots
Apr 27 07:40:28 srv01 sshd[21628]: Invalid user muhl from 138.68.48.118 port 51722
Apr 27 07:40:28 srv01 sshd[21628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.48.118
Apr 27 07:40:28 srv01 sshd[21628]: Invalid user muhl from 138.68.48.118 port 51722
Apr 27 07:40:30 srv01 sshd[21628]: Failed password for invalid user muhl from 138.68.48.118 port 51722 ssh2
Apr 27 07:44:15 srv01 sshd[21721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.48.118  user=root
Apr 27 07:44:17 srv01 sshd[21721]: Failed password for root from 138.68.48.118 port 34942 ssh2
...
2020-04-27 13:46:04
116.21.69.37 attackbotsspam
Apr 27 05:58:32 host sshd[1016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.21.69.37  user=root
Apr 27 05:58:34 host sshd[1016]: Failed password for root from 116.21.69.37 port 58426 ssh2
...
2020-04-27 13:18:22
2607:f298:6:a056::d53:a09d attack
Apr 27 06:07:33 wordpress wordpress(www.ruhnke.cloud)[16801]: Blocked authentication attempt for admin from 2607:f298:6:a056::d53:a09d
2020-04-27 13:57:26
202.126.208.122 attack
Apr 27 04:57:53 l03 sshd[19946]: Invalid user bcj from 202.126.208.122 port 47646
...
2020-04-27 13:45:07
114.98.126.14 attackspambots
Invalid user user from 114.98.126.14 port 55380
2020-04-27 13:26:49
129.146.103.14 attack
5x Failed Password
2020-04-27 13:58:51
209.141.32.190 attackspam
Apr 27 07:48:08 pkdns2 sshd\[6901\]: Invalid user vboxuser from 209.141.32.190Apr 27 07:48:09 pkdns2 sshd\[6901\]: Failed password for invalid user vboxuser from 209.141.32.190 port 58702 ssh2Apr 27 07:52:07 pkdns2 sshd\[7106\]: Invalid user admin from 209.141.32.190Apr 27 07:52:09 pkdns2 sshd\[7106\]: Failed password for invalid user admin from 209.141.32.190 port 42672 ssh2Apr 27 07:56:06 pkdns2 sshd\[7291\]: Invalid user test1 from 209.141.32.190Apr 27 07:56:08 pkdns2 sshd\[7291\]: Failed password for invalid user test1 from 209.141.32.190 port 54872 ssh2
...
2020-04-27 13:24:11
111.229.48.106 attackbots
Apr 27 06:24:54 mail sshd[16247]: Failed password for root from 111.229.48.106 port 52874 ssh2
Apr 27 06:28:36 mail sshd[17534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.48.106
Apr 27 06:28:38 mail sshd[17534]: Failed password for invalid user kazama from 111.229.48.106 port 38598 ssh2
2020-04-27 13:20:46
122.51.154.26 attack
2020-04-27T03:52:09.396270abusebot.cloudsearch.cf sshd[19717]: Invalid user demon from 122.51.154.26 port 49210
2020-04-27T03:52:09.402049abusebot.cloudsearch.cf sshd[19717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.154.26
2020-04-27T03:52:09.396270abusebot.cloudsearch.cf sshd[19717]: Invalid user demon from 122.51.154.26 port 49210
2020-04-27T03:52:11.098074abusebot.cloudsearch.cf sshd[19717]: Failed password for invalid user demon from 122.51.154.26 port 49210 ssh2
2020-04-27T03:58:26.419925abusebot.cloudsearch.cf sshd[20105]: Invalid user informatica from 122.51.154.26 port 56576
2020-04-27T03:58:26.424926abusebot.cloudsearch.cf sshd[20105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.154.26
2020-04-27T03:58:26.419925abusebot.cloudsearch.cf sshd[20105]: Invalid user informatica from 122.51.154.26 port 56576
2020-04-27T03:58:28.542587abusebot.cloudsearch.cf sshd[20105]: Failed pas
...
2020-04-27 13:21:39
185.50.149.2 attackspam
Repeated attempts to hack into email account.
2020-04-27 13:31:30
89.187.178.234 attackspam
(From ohman.lashunda@gmail.com) Good Day,

We were just visiting your website and decided to reach out through your contact form.

We’d like to take a moment to introduce ourselves: We are Stephanie Toth & Sandor Urban, Realtors with Keller Williams Realty and we are experts in the Florida market. Did someone say property matchmaker?

Within the current, unique situation GREAT opportunities are to be found. It is our job to stay on top of the Florida housing market. Perhaps you are ready to up/downscale to a different property and we will be more than glad to help you. Here's why you will love working with us:

* Innovative Marketing & Search Techniques
* Local Expertise
* Terrific Communication
* Expert Negotiators
* Detail Oriented
* Time Efficient

Call us for a free 15-minute consultation between 8am and 8pm:
(305) 363-2712

Or simply email us: sandor.urban@kw.com

https://bit.ly/MiamiProRealtor-com
https://bit.ly/sandorurbanrealtor

We hope you are staying safe out there!

Stepha
2020-04-27 13:59:16
124.156.112.181 attackspam
Apr 27 05:02:27 scw-6657dc sshd[31111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.112.181
Apr 27 05:02:27 scw-6657dc sshd[31111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.112.181
Apr 27 05:02:29 scw-6657dc sshd[31111]: Failed password for invalid user yy from 124.156.112.181 port 39452 ssh2
...
2020-04-27 13:39:22
49.49.235.215 attackbotsspam
Apr 27 05:58:14 icecube sshd[32979]: Failed password for root from 49.49.235.215 port 60330 ssh2
2020-04-27 13:32:20
138.68.178.64 attackbotsspam
Apr 27 06:52:39 vpn01 sshd[30195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.178.64
Apr 27 06:52:41 vpn01 sshd[30195]: Failed password for invalid user dw from 138.68.178.64 port 53572 ssh2
...
2020-04-27 13:43:40

Recently Reported IPs

13.52.248.162 13.52.250.173 13.52.246.68 13.52.250.233
13.52.250.71 13.52.253.139 13.52.250.107 13.52.253.164
13.52.254.149 13.52.254.137 13.52.254.131 13.52.252.181
13.54.159.79 13.54.144.38 13.54.153.36 13.54.183.173
13.54.165.117 13.54.188.184 13.54.191.247 13.54.19.47