Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: SoftLayer Technologies Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Mar 19 21:50:06 localhost sshd[128370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.117.213.194  user=root
Mar 19 21:50:08 localhost sshd[128370]: Failed password for root from 52.117.213.194 port 52990 ssh2
Mar 19 21:57:01 localhost sshd[129042]: Invalid user postgres from 52.117.213.194 port 49346
Mar 19 21:57:01 localhost sshd[129042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.117.213.194
Mar 19 21:57:01 localhost sshd[129042]: Invalid user postgres from 52.117.213.194 port 49346
Mar 19 21:57:02 localhost sshd[129042]: Failed password for invalid user postgres from 52.117.213.194 port 49346 ssh2
...
2020-03-20 05:59:45
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.117.213.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.117.213.194.			IN	A

;; AUTHORITY SECTION:
.			510	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031901 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 05:59:41 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 194.213.117.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.213.117.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.234.24.196 attackbotsspam
Port Scan: TCP/8080
2019-09-20 19:40:52
64.207.241.37 attackbotsspam
Port Scan: UDP/137
2019-09-20 20:24:47
72.164.41.213 attackbots
Port Scan: TCP/135
2019-09-20 19:49:17
220.136.14.222 attackspam
Port Scan: TCP/2323
2019-09-20 19:59:04
195.242.219.224 attackbots
Port Scan: TCP/443
2019-09-20 20:03:58
185.81.157.128 attackbotsspam
Port Scan: TCP/443
2019-09-20 20:07:31
66.129.118.22 attackspambots
Port Scan: TCP/445
2019-09-20 19:52:30
115.68.15.57 attack
Port Scan: TCP/445
2019-09-20 20:15:43
82.64.26.32 attack
Automatic report - Port Scan Attack
2019-09-20 20:21:19
128.73.74.199 attackspambots
Port Scan: TCP/8080
2019-09-20 20:14:13
190.210.83.209 attack
Port Scan: TCP/5431
2019-09-20 20:05:17
101.68.83.236 attack
Port Scan: UDP/49153
2019-09-20 19:46:33
113.29.99.160 attackspambots
Port Scan: UDP/39999
2019-09-20 19:41:22
112.54.204.2 attack
Port Scan: UDP/49153
2019-09-20 19:42:04
36.84.87.195 attackbots
Port Scan: TCP/34567
2019-09-20 19:56:22

Recently Reported IPs

104.133.83.72 98.127.97.234 44.235.1.14 1.2.128.109
113.101.77.28 144.193.28.195 187.167.194.79 197.2.187.91
91.76.148.82 82.64.96.98 142.227.94.31 208.126.196.196
108.3.70.6 175.50.245.241 126.1.88.27 188.237.118.57
151.16.37.37 201.207.83.194 98.209.66.28 204.48.27.30