Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.52.69.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12358
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.52.69.148.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:17:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
148.69.52.13.in-addr.arpa domain name pointer ec2-13-52-69-148.us-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.69.52.13.in-addr.arpa	name = ec2-13-52-69-148.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.30.113 attackbots
Invalid user postgres from 49.234.30.113 port 42952
2020-03-28 08:02:24
198.245.51.185 attackbotsspam
Invalid user miolo from 198.245.51.185 port 34826
2020-03-28 07:45:23
129.204.63.100 attackbotsspam
5x Failed Password
2020-03-28 07:40:34
43.225.151.252 attackspam
SSH Login Bruteforce
2020-03-28 07:47:43
187.141.128.42 attack
SSH Invalid Login
2020-03-28 07:45:35
164.132.197.108 attackspam
Invalid user dory from 164.132.197.108 port 54374
2020-03-28 07:37:51
106.13.87.170 attackbots
(sshd) Failed SSH login from 106.13.87.170 (CN/China/-): 5 in the last 3600 secs
2020-03-28 08:11:52
104.198.176.233 attackbots
trying to access non-authorized port
2020-03-28 07:36:26
148.66.147.15 attack
A SQL Injection Attack returned code 200 (success).
2020-03-28 08:13:35
49.235.39.217 attackbotsspam
Mar 27 23:32:18 pkdns2 sshd\[24373\]: Invalid user ixe from 49.235.39.217Mar 27 23:32:20 pkdns2 sshd\[24373\]: Failed password for invalid user ixe from 49.235.39.217 port 56372 ssh2Mar 27 23:35:38 pkdns2 sshd\[24540\]: Invalid user gitlab-prometheus from 49.235.39.217Mar 27 23:35:39 pkdns2 sshd\[24540\]: Failed password for invalid user gitlab-prometheus from 49.235.39.217 port 59288 ssh2Mar 27 23:38:58 pkdns2 sshd\[24674\]: Invalid user xmu from 49.235.39.217Mar 27 23:39:00 pkdns2 sshd\[24674\]: Failed password for invalid user xmu from 49.235.39.217 port 33978 ssh2
...
2020-03-28 08:06:33
179.60.83.75 attackspambots
Unauthorized connection attempt from IP address 179.60.83.75 on Port 445(SMB)
2020-03-28 08:15:30
183.89.153.5 attack
Unauthorized connection attempt from IP address 183.89.153.5 on Port 445(SMB)
2020-03-28 08:04:00
125.227.236.60 attackbots
Invalid user mckenna from 125.227.236.60 port 57312
2020-03-28 08:01:24
159.65.77.254 attackbots
Invalid user ssladmin from 159.65.77.254 port 50068
2020-03-28 07:50:19
92.118.160.45 attackbotsspam
Honeypot hit.
2020-03-28 07:34:00

Recently Reported IPs

104.248.1.98 41.34.88.99 125.131.22.121 41.45.123.85
120.85.182.68 175.199.26.70 121.40.131.73 185.89.100.110
63.143.41.182 27.6.197.203 110.93.207.170 103.230.107.236
91.121.171.183 188.243.182.58 8.210.57.22 128.199.89.3
62.76.94.180 162.62.179.61 61.177.173.21 118.26.38.139