Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.10.71.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25769
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.10.71.157.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 03 19:54:05 CST 2019
;; MSG SIZE  rcvd: 116

Host info
157.71.10.52.in-addr.arpa domain name pointer ec2-52-10-71-157.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
157.71.10.52.in-addr.arpa	name = ec2-52-10-71-157.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
80.211.135.211 attackspam
Feb  6 19:00:08 pornomens sshd\[17849\]: Invalid user moi from 80.211.135.211 port 55802
Feb  6 19:00:08 pornomens sshd\[17849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.135.211
Feb  6 19:00:09 pornomens sshd\[17849\]: Failed password for invalid user moi from 80.211.135.211 port 55802 ssh2
...
2020-02-07 03:24:02
13.67.54.145 attackspambots
Feb  6 20:21:35 serwer sshd\[7183\]: Invalid user uvs from 13.67.54.145 port 44502
Feb  6 20:21:35 serwer sshd\[7183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.54.145
Feb  6 20:21:37 serwer sshd\[7183\]: Failed password for invalid user uvs from 13.67.54.145 port 44502 ssh2
...
2020-02-07 03:48:54
36.90.60.127 attackbots
DATE:2020-02-06 14:38:45, IP:36.90.60.127, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-02-07 03:52:19
177.131.108.161 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 06-02-2020 13:40:17.
2020-02-07 03:31:52
211.112.110.84 attackspam
firewall-block, port(s): 9090/tcp
2020-02-07 03:24:25
161.129.66.242 attackspam
0,42-11/07 [bc01/m10] PostRequest-Spammer scoring: brussels
2020-02-07 04:00:52
181.115.181.171 attack
Fail2Ban Ban Triggered
2020-02-07 03:58:43
148.70.223.29 attack
$f2bV_matches
2020-02-07 03:25:39
122.51.114.213 attack
$f2bV_matches
2020-02-07 03:45:45
61.149.194.91 attack
Feb  6 14:40:08 vmd17057 sshd\[26769\]: Invalid user zzj from 61.149.194.91 port 56160
Feb  6 14:40:08 vmd17057 sshd\[26769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.149.194.91
Feb  6 14:40:10 vmd17057 sshd\[26769\]: Failed password for invalid user zzj from 61.149.194.91 port 56160 ssh2
...
2020-02-07 03:37:32
220.132.83.220 attack
Automatic report - Port Scan Attack
2020-02-07 03:57:38
60.171.116.44 attackbots
Feb  6 14:34:54 xeon cyrus/imap[36338]: badlogin: [60.171.116.44] plain [SASL(-13): authentication failure: Password verification failed]
2020-02-07 03:43:40
5.196.72.11 attackbots
Feb  6 20:04:49 haigwepa sshd[30703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.11 
Feb  6 20:04:51 haigwepa sshd[30703]: Failed password for invalid user cnp from 5.196.72.11 port 38656 ssh2
...
2020-02-07 03:25:08
185.156.73.52 attackbots
02/06/2020-14:31:11.740460 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-07 03:42:26
94.217.195.197 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-07 03:34:55

Recently Reported IPs

66.243.24.74 43.249.205.129 36.73.218.62 160.120.231.156
91.45.167.69 41.76.209.14 27.194.111.55 119.122.79.175
103.39.9.171 186.215.97.234 89.76.90.230 92.193.217.149
69.236.109.35 217.87.183.126 206.242.3.211 34.226.38.95
147.117.198.16 153.19.5.198 12.49.34.154 36.90.58.224