Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.112.162.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14607
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.112.162.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121901 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 04:41:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 140.162.112.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.162.112.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.127.148.46 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-03 19:09:38
218.92.0.203 attackspam
Oct  3 12:29:28 pve1 sshd[13975]: Failed password for root from 218.92.0.203 port 24630 ssh2
Oct  3 12:29:32 pve1 sshd[13975]: Failed password for root from 218.92.0.203 port 24630 ssh2
...
2020-10-03 19:03:51
45.248.69.106 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-03T08:42:17Z and 2020-10-03T08:45:09Z
2020-10-03 19:34:23
157.245.244.212 attackbots
SSH brute-force attack detected from [157.245.244.212]
2020-10-03 19:36:59
180.76.157.174 attackspambots
Invalid user student1 from 180.76.157.174 port 34354
2020-10-03 19:08:30
128.199.84.201 attackspambots
Invalid user apache from 128.199.84.201 port 48552
2020-10-03 19:42:06
134.175.219.148 attackbots
Invalid user pen from 134.175.219.148 port 54900
2020-10-03 19:17:55
193.247.213.196 attackspam
SSH login attempts.
2020-10-03 19:38:30
178.32.192.85 attackspambots
SSH auth scanning - multiple failed logins
2020-10-03 19:21:05
142.44.170.9 attackbots
SpamScore above: 10.0
2020-10-03 19:02:16
159.203.168.167 attackbots
Oct  3 11:44:41 DAAP sshd[11997]: Invalid user user from 159.203.168.167 port 38682
Oct  3 11:44:41 DAAP sshd[11997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.168.167
Oct  3 11:44:41 DAAP sshd[11997]: Invalid user user from 159.203.168.167 port 38682
Oct  3 11:44:42 DAAP sshd[11997]: Failed password for invalid user user from 159.203.168.167 port 38682 ssh2
Oct  3 11:48:49 DAAP sshd[12047]: Invalid user deploy from 159.203.168.167 port 35302
...
2020-10-03 19:06:02
118.70.170.120 attackbots
Invalid user mcguitaruser from 118.70.170.120 port 41760
2020-10-03 19:44:36
203.109.82.44 attack
SSH login attempts.
2020-10-03 19:32:37
190.3.118.163 attack
Port scan on 1 port(s): 445
2020-10-03 19:34:59
117.50.63.120 attack
SSH login attempts.
2020-10-03 19:30:41

Recently Reported IPs

93.166.77.104 57.95.236.145 27.41.178.140 181.202.178.132
40.23.61.119 251.250.56.251 43.108.131.141 171.41.67.103
252.116.50.51 139.179.195.43 24.203.110.161 5.189.228.55
176.244.37.12 6.228.229.84 92.229.63.71 51.122.193.99
108.96.169.241 80.78.59.58 221.16.130.78 5.196.121.172