Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.114.21.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.114.21.119.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012600 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 22:22:00 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 119.21.114.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.21.114.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.237.140.120 attackspambots
May  2 17:34:17 OPSO sshd\[19516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.237.140.120  user=root
May  2 17:34:19 OPSO sshd\[19516\]: Failed password for root from 45.237.140.120 port 41954 ssh2
May  2 17:39:19 OPSO sshd\[21003\]: Invalid user william from 45.237.140.120 port 53498
May  2 17:39:19 OPSO sshd\[21003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.237.140.120
May  2 17:39:22 OPSO sshd\[21003\]: Failed password for invalid user william from 45.237.140.120 port 53498 ssh2
2020-05-02 23:53:21
203.56.232.33 attackspam
May  2 17:17:52 hosting sshd[12596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.56.232.33  user=root
May  2 17:17:54 hosting sshd[12596]: Failed password for root from 203.56.232.33 port 57714 ssh2
...
2020-05-03 00:01:20
203.186.10.162 attack
May  2 17:55:36 meumeu sshd[16518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.186.10.162 
May  2 17:55:39 meumeu sshd[16518]: Failed password for invalid user administrator from 203.186.10.162 port 38796 ssh2
May  2 17:59:33 meumeu sshd[17070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.186.10.162 
...
2020-05-03 00:00:55
93.174.93.10 attack
May  3 01:53:59 web1 sshd[2551]: Invalid user xxxxxxxxxxxxxxxxxxxxxxxx from 93.174.93.10 port 46428
May  3 01:54:00 web1 sshd[2552]: Invalid user xxxxxxxxxxxxxxxxxxxxxxxx from 93.174.93.10 port 56261
May  3 01:53:59 web1 sshd[2551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.174.93.10
May  3 01:53:59 web1 sshd[2551]: Invalid user xxxxxxxxxxxxxxxxxxxxxxxx from 93.174.93.10 port 46428
May  3 01:54:02 web1 sshd[2551]: Failed password for invalid user xxxxxxxxxxxxxxxxxxxxxxxx from 93.174.93.10 port 46428 ssh2
May  3 01:54:00 web1 sshd[2552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.174.93.10
May  3 01:54:00 web1 sshd[2552]: Invalid user xxxxxxxxxxxxxxxxxxxxxxxx from 93.174.93.10 port 56261
May  3 01:54:02 web1 sshd[2552]: Failed password for invalid user xxxxxxxxxxxxxxxxxxxxxxxx from 93.174.93.10 port 56261 ssh2
May  3 01:54:04 web1 sshd[2571]: Invalid user butter from 93.174.93.10 port 49257
...
2020-05-03 00:07:51
113.78.66.239 attackspam
FTP brute-force attack
2020-05-03 00:33:44
222.186.42.136 attackspambots
May  3 01:50:54 localhost sshd[1871633]: Disconnected from 222.186.42.136 port 46791 [preauth]
...
2020-05-02 23:58:45
103.23.125.94 attackspambots
SNORT TCP  Port: 25 Classtype misc-attack - ET DROP Spamhaus DROP Listed Traffic Inbound group 5 - - Destination xx.xx.4.1 Port: 25 - - Source 103.23.125.94 Port: 52195   (Listed on  barracuda zen-spamhaus spam-sorbs)     (188)
2020-05-03 00:15:14
129.226.71.163 attack
May  2 17:12:35 vmd26974 sshd[9989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.71.163
May  2 17:12:37 vmd26974 sshd[9989]: Failed password for invalid user tun from 129.226.71.163 port 53204 ssh2
...
2020-05-03 00:04:45
49.232.141.44 attackbots
May  2 16:34:21 sip sshd[80298]: Invalid user gitlab-runner from 49.232.141.44 port 51631
May  2 16:34:23 sip sshd[80298]: Failed password for invalid user gitlab-runner from 49.232.141.44 port 51631 ssh2
May  2 16:39:30 sip sshd[80329]: Invalid user rapa from 49.232.141.44 port 49668
...
2020-05-03 00:17:50
218.92.0.145 attack
2020-05-02T12:10:01.612023xentho-1 sshd[347987]: Failed password for root from 218.92.0.145 port 16999 ssh2
2020-05-02T12:09:55.253286xentho-1 sshd[347987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
2020-05-02T12:09:57.644878xentho-1 sshd[347987]: Failed password for root from 218.92.0.145 port 16999 ssh2
2020-05-02T12:10:01.612023xentho-1 sshd[347987]: Failed password for root from 218.92.0.145 port 16999 ssh2
2020-05-02T12:10:06.051568xentho-1 sshd[347987]: Failed password for root from 218.92.0.145 port 16999 ssh2
2020-05-02T12:09:55.253286xentho-1 sshd[347987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
2020-05-02T12:09:57.644878xentho-1 sshd[347987]: Failed password for root from 218.92.0.145 port 16999 ssh2
2020-05-02T12:10:01.612023xentho-1 sshd[347987]: Failed password for root from 218.92.0.145 port 16999 ssh2
2020-05-02T12:10:06.051568xent
...
2020-05-03 00:31:41
176.31.127.152 attackbots
May  2 15:25:19 vlre-nyc-1 sshd\[19822\]: Invalid user database from 176.31.127.152
May  2 15:25:19 vlre-nyc-1 sshd\[19822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.127.152
May  2 15:25:21 vlre-nyc-1 sshd\[19822\]: Failed password for invalid user database from 176.31.127.152 port 44732 ssh2
May  2 15:32:12 vlre-nyc-1 sshd\[19950\]: Invalid user bbb from 176.31.127.152
May  2 15:32:12 vlre-nyc-1 sshd\[19950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.127.152
...
2020-05-03 00:03:21
83.24.32.158 attackbots
May  2 16:28:00 sip sshd[80209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.32.158 
May  2 16:28:00 sip sshd[80209]: Invalid user lhc from 83.24.32.158 port 47782
May  2 16:28:03 sip sshd[80209]: Failed password for invalid user lhc from 83.24.32.158 port 47782 ssh2
...
2020-05-03 00:39:06
80.82.70.138 attack
May  2 17:59:00 ns3042688 courier-pop3d: LOGIN FAILED, user=contact@sikla-systems.es, ip=\[::ffff:80.82.70.138\]
...
2020-05-03 00:17:09
185.228.135.10 attackspambots
Dovecot Invalid User Login Attempt.
2020-05-03 00:34:40
84.22.63.122 attackspambots
Spam Timestamp : 02-May-20 12:10   BlockList Provider  truncate.gbudb.net   (189)
2020-05-03 00:08:09

Recently Reported IPs

18.92.125.230 41.33.129.154 14.159.223.186 71.134.179.160
64.11.128.34 214.155.211.17 26.78.64.167 192.244.32.56
234.71.162.139 89.101.255.233 210.104.173.63 96.190.143.199
88.72.181.220 3.69.245.76 111.178.108.126 194.244.59.3
80.160.197.15 68.10.132.111 97.220.60.211 234.17.196.179