Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.12.142.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.12.142.56.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010201 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 08:04:30 CST 2020
;; MSG SIZE  rcvd: 116
Host info
56.142.12.52.in-addr.arpa domain name pointer ec2-52-12-142-56.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.142.12.52.in-addr.arpa	name = ec2-52-12-142-56.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.117.177.97 attackspam
port scan and connect, tcp 23 (telnet)
2020-03-03 14:08:21
61.154.174.54 attackspambots
Brute-force attempt banned
2020-03-03 13:41:07
5.39.93.158 attack
2020-03-03T05:16:08.863079shield sshd\[10881\]: Invalid user chenlu from 5.39.93.158 port 59712
2020-03-03T05:16:08.867193shield sshd\[10881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3280070.ip-5-39-93.eu
2020-03-03T05:16:10.503980shield sshd\[10881\]: Failed password for invalid user chenlu from 5.39.93.158 port 59712 ssh2
2020-03-03T05:24:58.713877shield sshd\[12363\]: Invalid user arma from 5.39.93.158 port 45806
2020-03-03T05:24:58.723256shield sshd\[12363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3280070.ip-5-39-93.eu
2020-03-03 13:37:42
188.166.159.148 attackbotsspam
Mar  3 05:58:59 163-172-32-151 sshd[17195]: Invalid user chef from 188.166.159.148 port 59010
...
2020-03-03 13:28:16
87.16.189.44 attack
Honeypot attack, port: 5555, PTR: host44-189-dynamic.16-87-r.retail.telecomitalia.it.
2020-03-03 13:42:23
222.122.60.110 attack
Mar  3 01:41:25 server sshd\[28209\]: Failed password for invalid user time from 222.122.60.110 port 37230 ssh2
Mar  3 07:47:42 server sshd\[31736\]: Invalid user hadoop from 222.122.60.110
Mar  3 07:47:42 server sshd\[31736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.122.60.110 
Mar  3 07:47:44 server sshd\[31736\]: Failed password for invalid user hadoop from 222.122.60.110 port 36566 ssh2
Mar  3 07:58:42 server sshd\[1160\]: Invalid user bruno from 222.122.60.110
Mar  3 07:58:42 server sshd\[1160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.122.60.110 
...
2020-03-03 13:45:48
188.87.253.252 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 14:04:47
222.186.175.151 attackbots
Mar  3 07:01:09 dedicated sshd[30608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Mar  3 07:01:10 dedicated sshd[30608]: Failed password for root from 222.186.175.151 port 5206 ssh2
2020-03-03 14:01:55
222.186.52.139 attackspam
Mar  3 02:28:52 firewall sshd[22929]: Failed password for root from 222.186.52.139 port 22730 ssh2
Mar  3 02:28:54 firewall sshd[22929]: Failed password for root from 222.186.52.139 port 22730 ssh2
Mar  3 02:28:58 firewall sshd[22929]: Failed password for root from 222.186.52.139 port 22730 ssh2
...
2020-03-03 13:33:35
61.0.236.129 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 13:35:22
23.94.153.187 attackspam
03/02/2020-23:58:14.982068 23.94.153.187 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-03 14:08:40
138.68.237.12 attackspam
Mar  2 18:50:35 wbs sshd\[4505\]: Invalid user administrator from 138.68.237.12
Mar  2 18:50:35 wbs sshd\[4505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com
Mar  2 18:50:37 wbs sshd\[4505\]: Failed password for invalid user administrator from 138.68.237.12 port 39966 ssh2
Mar  2 18:58:46 wbs sshd\[5290\]: Invalid user ubuntu from 138.68.237.12
Mar  2 18:58:46 wbs sshd\[5290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com
2020-03-03 13:42:05
222.186.175.181 attackspambots
2020-03-03T06:31:35.188613scmdmz1 sshd[28801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
2020-03-03T06:31:37.410859scmdmz1 sshd[28801]: Failed password for root from 222.186.175.181 port 51613 ssh2
2020-03-03T06:31:40.607718scmdmz1 sshd[28801]: Failed password for root from 222.186.175.181 port 51613 ssh2
2020-03-03T06:31:35.188613scmdmz1 sshd[28801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
2020-03-03T06:31:37.410859scmdmz1 sshd[28801]: Failed password for root from 222.186.175.181 port 51613 ssh2
2020-03-03T06:31:40.607718scmdmz1 sshd[28801]: Failed password for root from 222.186.175.181 port 51613 ssh2
2020-03-03T06:31:35.188613scmdmz1 sshd[28801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
2020-03-03T06:31:37.410859scmdmz1 sshd[28801]: Failed password for root from 222.186.175.181 port 5161
2020-03-03 13:36:17
61.153.231.58 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 13:54:41
124.123.176.224 attackbotsspam
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-03-03 13:49:47

Recently Reported IPs

118.103.217.251 158.89.178.24 132.232.109.224 178.40.131.123
2.228.214.255 156.113.249.209 106.13.64.150 192.241.58.168
54.203.155.216 112.252.46.44 219.159.157.220 14.174.20.171
78.217.220.98 46.21.145.50 98.249.144.202 131.216.110.154
119.3.179.212 74.210.210.198 95.142.248.238 128.97.25.42