Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.15.80.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.15.80.148.			IN	A

;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:51:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
148.80.15.52.in-addr.arpa domain name pointer ec2-52-15-80-148.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.80.15.52.in-addr.arpa	name = ec2-52-15-80-148.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
87.246.7.70 attackspam
Jun  2 14:21:07 webserver postfix/smtpd\[3276\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  2 14:21:56 webserver postfix/smtpd\[3276\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  2 14:22:44 webserver postfix/smtpd\[3276\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  2 14:23:32 webserver postfix/smtpd\[3347\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  2 14:24:18 webserver postfix/smtpd\[3347\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-02 20:31:12
104.236.137.194 attack
2020-06-02T13:54:15.221144v22018076590370373 sshd[5699]: Failed password for root from 104.236.137.194 port 53818 ssh2
2020-06-02T14:01:34.432638v22018076590370373 sshd[24246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.137.194  user=root
2020-06-02T14:01:36.512005v22018076590370373 sshd[24246]: Failed password for root from 104.236.137.194 port 56482 ssh2
2020-06-02T14:08:40.158959v22018076590370373 sshd[7729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.137.194  user=root
2020-06-02T14:08:42.388628v22018076590370373 sshd[7729]: Failed password for root from 104.236.137.194 port 59142 ssh2
...
2020-06-02 20:41:06
188.235.0.207 attack
Jun  2 02:04:50 web9 sshd\[22675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.0.207  user=root
Jun  2 02:04:52 web9 sshd\[22675\]: Failed password for root from 188.235.0.207 port 47214 ssh2
Jun  2 02:06:42 web9 sshd\[22882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.0.207  user=root
Jun  2 02:06:44 web9 sshd\[22882\]: Failed password for root from 188.235.0.207 port 50338 ssh2
Jun  2 02:08:45 web9 sshd\[23149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.0.207  user=root
2020-06-02 20:33:25
47.9.12.22 attackspambots
1591099726 - 06/02/2020 14:08:46 Host: 47.9.12.22/47.9.12.22 Port: 445 TCP Blocked
2020-06-02 20:36:40
117.199.224.120 attackspam
1591099706 - 06/02/2020 14:08:26 Host: 117.199.224.120/117.199.224.120 Port: 445 TCP Blocked
2020-06-02 21:03:29
159.203.177.191 attackspambots
Jun  2 13:59:46 cloud sshd[7337]: Failed password for root from 159.203.177.191 port 37518 ssh2
2020-06-02 20:55:16
195.242.218.8 attackbots
spam spam spam
2020-06-02 20:42:42
36.230.174.194 attackspambots
Jun  2 14:08:48 fhem-rasp sshd[8139]: Failed password for root from 36.230.174.194 port 41178 ssh2
Jun  2 14:08:50 fhem-rasp sshd[8139]: Connection closed by authenticating user root 36.230.174.194 port 41178 [preauth]
...
2020-06-02 20:26:25
199.119.144.20 attackspambots
SSH brutforce
2020-06-02 20:35:07
5.135.186.52 attackbotsspam
2020-06-02T14:03:44.640914sd-86998 sshd[21258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns396704.ip-5-135-186.eu  user=root
2020-06-02T14:03:46.900912sd-86998 sshd[21258]: Failed password for root from 5.135.186.52 port 54724 ssh2
2020-06-02T14:06:08.521935sd-86998 sshd[22086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns396704.ip-5-135-186.eu  user=root
2020-06-02T14:06:10.550484sd-86998 sshd[22086]: Failed password for root from 5.135.186.52 port 52094 ssh2
2020-06-02T14:08:32.809291sd-86998 sshd[23091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns396704.ip-5-135-186.eu  user=root
2020-06-02T14:08:34.938893sd-86998 sshd[23091]: Failed password for root from 5.135.186.52 port 49296 ssh2
...
2020-06-02 20:52:56
23.97.180.45 attackspambots
2020-06-02T12:01:23.644164shield sshd\[22433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45  user=root
2020-06-02T12:01:25.546844shield sshd\[22433\]: Failed password for root from 23.97.180.45 port 40379 ssh2
2020-06-02T12:05:11.908912shield sshd\[22921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45  user=root
2020-06-02T12:05:13.445871shield sshd\[22921\]: Failed password for root from 23.97.180.45 port 43382 ssh2
2020-06-02T12:08:54.095210shield sshd\[23447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45  user=root
2020-06-02 20:24:09
27.22.48.61 attackbots
Jun  2 08:08:31 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:32 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:35 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:40 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:42 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.22.48.61
2020-06-02 20:41:52
185.176.27.34 attack
06/02/2020-08:20:21.841497 185.176.27.34 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-02 20:53:27
108.170.137.120 attackspambots
Jun  2 14:08:29 fhem-rasp sshd[7902]: Failed password for root from 108.170.137.120 port 33406 ssh2
Jun  2 14:08:29 fhem-rasp sshd[7902]: Connection closed by authenticating user root 108.170.137.120 port 33406 [preauth]
...
2020-06-02 20:59:41
223.17.100.194 attack
Jun  2 14:08:37 fhem-rasp sshd[8022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.17.100.194  user=root
Jun  2 14:08:40 fhem-rasp sshd[8022]: Failed password for root from 223.17.100.194 port 54161 ssh2
...
2020-06-02 20:45:38

Recently Reported IPs

146.120.14.114 114.119.136.137 102.141.10.118 45.148.234.141
89.228.140.21 67.84.80.120 212.192.246.182 151.28.102.141
92.100.77.130 34.210.0.4 36.110.142.212 201.39.15.218
14.245.240.175 152.67.62.120 31.58.28.188 185.159.157.129
172.70.211.102 211.36.141.72 116.249.140.229 177.23.187.187