Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.1.112.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.1.112.149.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041401 1800 900 604800 86400

;; Query time: 147 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 06:51:18 CST 2020
;; MSG SIZE  rcvd: 116
Host info
149.112.1.52.in-addr.arpa domain name pointer ec2-52-1-112-149.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.112.1.52.in-addr.arpa	name = ec2-52-1-112-149.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.129.1.237 attack
SSH Brute Force
2019-07-01 12:37:48
185.208.208.198 attackbots
SNORT TCP  Port: 3389 Classtype misc-attack - ET DROP Dshield Block Listed Source group 1 - - Destination xx.xx.4.1 Port: 3389 - - Source 185.208.208.198 Port: 50117 _ (Listed on  zen-spamhaus) _ _ (388)
2019-07-01 14:00:31
181.40.73.86 attack
$f2bV_matches
2019-07-01 12:38:43
122.114.79.98 attackbotsspam
$f2bV_matches
2019-07-01 12:36:04
2607:5300:60:11af::1 attack
xmlrpc attack
2019-07-01 12:31:49
125.64.94.220 attack
01.07.2019 04:36:43 Connection to port 60010 blocked by firewall
2019-07-01 13:17:44
92.63.194.115 attackbotsspam
01.07.2019 06:13:08 Connection to port 24717 blocked by firewall
2019-07-01 14:25:35
185.176.27.66 attackbotsspam
firewall-block, port(s): 7725/tcp, 7733/tcp
2019-07-01 14:06:09
92.119.160.125 attackbots
01.07.2019 05:04:48 Connection to port 3203 blocked by firewall
2019-07-01 13:26:36
113.183.118.17 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-01 03:26:46,221 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.183.118.17)
2019-07-01 12:39:49
80.82.64.127 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-07-01 13:36:06
185.209.0.19 attack
*Port Scan* detected from 185.209.0.19 (LV/Latvia/-). 4 hits in the last 170 seconds
2019-07-01 13:59:42
185.176.27.78 attack
Portscan or hack attempt detected by psad/fwsnort
2019-07-01 14:04:43
196.203.31.154 attackbots
Tried sshing with brute force.
2019-07-01 12:32:42
185.176.27.62 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-01 14:06:46

Recently Reported IPs

12.100.209.123 61.148.214.61 52.208.49.70 3.221.78.114
93.24.102.62 35.129.7.27 192.241.237.195 126.222.234.162
218.237.215.141 90.139.33.206 74.129.140.237 62.8.2.79
36.73.217.180 54.236.150.136 154.196.148.230 115.225.107.135
147.252.46.105 1.132.186.243 235.215.165.245 167.99.231.70