Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.12.85.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.12.85.3.			IN	A

;; AUTHORITY SECTION:
.			183	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 07 11:35:56 CST 2022
;; MSG SIZE  rcvd: 103
Host info
3.85.12.52.in-addr.arpa domain name pointer ec2-52-12-85-3.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.85.12.52.in-addr.arpa	name = ec2-52-12-85-3.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.41 attack
Dec 11 12:40:32 h2177944 sshd\[5291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Dec 11 12:40:33 h2177944 sshd\[5291\]: Failed password for root from 222.186.180.41 port 8464 ssh2
Dec 11 12:40:38 h2177944 sshd\[5291\]: Failed password for root from 222.186.180.41 port 8464 ssh2
Dec 11 12:40:41 h2177944 sshd\[5291\]: Failed password for root from 222.186.180.41 port 8464 ssh2
...
2019-12-11 19:48:47
179.124.34.8 attackspambots
Dec 11 00:18:00 eddieflores sshd\[27078\]: Invalid user caves from 179.124.34.8
Dec 11 00:18:00 eddieflores sshd\[27078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.8
Dec 11 00:18:01 eddieflores sshd\[27078\]: Failed password for invalid user caves from 179.124.34.8 port 38946 ssh2
Dec 11 00:24:28 eddieflores sshd\[27648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.8  user=root
Dec 11 00:24:30 eddieflores sshd\[27648\]: Failed password for root from 179.124.34.8 port 43519 ssh2
2019-12-11 19:55:14
106.12.13.247 attackbotsspam
Dec 11 04:53:14 ny01 sshd[9819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
Dec 11 04:53:16 ny01 sshd[9819]: Failed password for invalid user http from 106.12.13.247 port 47258 ssh2
Dec 11 04:59:35 ny01 sshd[10918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
2019-12-11 20:15:12
103.116.84.9 attackspam
Unauthorized connection attempt detected from IP address 103.116.84.9 to port 80
2019-12-11 19:52:06
50.127.71.5 attackbotsspam
SSH Brute Force
2019-12-11 20:19:36
79.134.4.11 attackspambots
Unauthorized connection attempt detected from IP address 79.134.4.11 to port 445
2019-12-11 19:44:36
121.7.25.238 attackspam
Host Scan
2019-12-11 20:18:48
178.34.156.249 attack
2019-12-11T11:23:53.219771struts4.enskede.local sshd\[12941\]: Invalid user hudlow from 178.34.156.249 port 33996
2019-12-11T11:23:53.226507struts4.enskede.local sshd\[12941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.34.156.249
2019-12-11T11:23:55.262661struts4.enskede.local sshd\[12941\]: Failed password for invalid user hudlow from 178.34.156.249 port 33996 ssh2
2019-12-11T11:29:22.901618struts4.enskede.local sshd\[12956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.34.156.249  user=root
2019-12-11T11:29:25.186364struts4.enskede.local sshd\[12956\]: Failed password for root from 178.34.156.249 port 41992 ssh2
...
2019-12-11 19:56:57
45.57.236.202 attackspam
(From edwardfrancis792@gmail.com) Greetings!

I'm an online digital marketer, and I just finished conducting some SEO reporting tests on your site. The results showed a few issues preventing it from being easily found by people searching online for products/services relevant to your business. There's also a great amount of additional web traffic we can get you by making your website get a better placement on the search engine results with search engine optimization.

I'd really like to discuss with you more helpful information about this, so please reply let me know if you're interested. I can also provide a free consultation to present you the data about your website's potential and where I can take it further. Don't worry about my rates since they're considered cheap even by small start-up companies.

I hope to speak with you and share some helpful insights. Just let me know about the best time to give you a call. Talk to you soon! 

Best regards,
Edward Francis
2019-12-11 20:16:40
218.92.0.145 attackbotsspam
Dec 11 09:14:07 firewall sshd[29448]: Failed password for root from 218.92.0.145 port 51211 ssh2
Dec 11 09:14:20 firewall sshd[29448]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 51211 ssh2 [preauth]
Dec 11 09:14:20 firewall sshd[29448]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-11 20:15:38
76.181.42.12 attack
Dec 11 11:54:11 vpn01 sshd[23260]: Failed password for root from 76.181.42.12 port 59996 ssh2
...
2019-12-11 20:17:53
202.88.241.107 attackspam
Dec 11 12:24:04 pornomens sshd\[27074\]: Invalid user applmgr from 202.88.241.107 port 45492
Dec 11 12:24:04 pornomens sshd\[27074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.241.107
Dec 11 12:24:07 pornomens sshd\[27074\]: Failed password for invalid user applmgr from 202.88.241.107 port 45492 ssh2
...
2019-12-11 19:56:41
113.2.171.5 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-11 20:10:15
114.33.186.241 attack
Fail2Ban Ban Triggered
2019-12-11 19:46:10
223.247.194.119 attack
Dec 11 11:22:05 server sshd\[27306\]: Invalid user xin from 223.247.194.119
Dec 11 11:22:05 server sshd\[27306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.119 
Dec 11 11:22:07 server sshd\[27306\]: Failed password for invalid user xin from 223.247.194.119 port 47092 ssh2
Dec 11 11:38:06 server sshd\[31686\]: Invalid user destin from 223.247.194.119
Dec 11 11:38:06 server sshd\[31686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.119 
...
2019-12-11 20:22:20

Recently Reported IPs

234.244.44.39 123.2.9.60 31.50.51.7 174.78.66.170
20.8.49.26 4.25.52.66 6.40.83.11 187.163.72.162
93.12.229.196 185.63.125.247 165.22.111.236 8.95.213.7
82.65.8.80 7.23.87.29 192.168.1.34 83.107.81.66
51.115.23.9 103.253.24.240 15.84.5.73 76.187.13.200