Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ireland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.16.49.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.16.49.64.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 13:00:50 CST 2025
;; MSG SIZE  rcvd: 104
Host info
64.49.16.52.in-addr.arpa domain name pointer ec2-52-16-49-64.eu-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.49.16.52.in-addr.arpa	name = ec2-52-16-49-64.eu-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.103.80.183 attackspambots
Jun 19 15:23:05 webhost01 sshd[11623]: Failed password for root from 94.103.80.183 port 59978 ssh2
...
2020-06-19 19:06:20
64.98.36.4 attackspam
SSH login attempts.
2020-06-19 18:58:22
112.85.42.173 attackbots
Jun 19 13:04:59 vps sshd[38484]: Failed password for root from 112.85.42.173 port 51664 ssh2
Jun 19 13:05:02 vps sshd[38484]: Failed password for root from 112.85.42.173 port 51664 ssh2
Jun 19 13:05:06 vps sshd[38484]: Failed password for root from 112.85.42.173 port 51664 ssh2
Jun 19 13:05:09 vps sshd[38484]: Failed password for root from 112.85.42.173 port 51664 ssh2
Jun 19 13:05:12 vps sshd[38484]: Failed password for root from 112.85.42.173 port 51664 ssh2
...
2020-06-19 19:05:48
42.236.10.108 attackbotsspam
Automated report (2020-06-19T12:51:44+08:00). Scraper detected at this address.
2020-06-19 19:00:22
40.101.18.226 attackspam
SSH login attempts.
2020-06-19 18:47:43
23.21.153.210 attackbots
SSH login attempts.
2020-06-19 19:16:31
195.4.92.218 attackbots
SSH login attempts.
2020-06-19 18:54:40
54.221.234.156 attack
SSH login attempts.
2020-06-19 19:00:08
27.255.77.248 attackspambots
smtp brute force login
2020-06-19 19:10:07
203.114.106.182 attack
20/6/18@23:53:23: FAIL: Alarm-Network address from=203.114.106.182
...
2020-06-19 18:56:58
40.101.80.18 attack
SSH login attempts.
2020-06-19 18:50:21
178.234.232.10 attack
GET /administrator/ HTTP/1.1
GET /administrator/index.php
GET /wp-login.php HTTP/1.1
GET /wp-admin/ HTTP/1.1
GET /admin.php HTTP/1.1
GET /admin HTTP/1.1
GET /admin HTTP/1.1
GET /admin/ HTTP/1.1
2020-06-19 18:45:59
154.92.15.7 attackbotsspam
Fail2Ban Ban Triggered
2020-06-19 19:09:37
148.70.68.36 attackbotsspam
Jun 19 10:55:29 l03 sshd[6371]: Invalid user sftpuser from 148.70.68.36 port 53302
...
2020-06-19 18:44:35
184.73.165.106 attackspam
SSH login attempts.
2020-06-19 19:20:25

Recently Reported IPs

80.197.24.69 59.62.183.233 185.56.66.33 168.243.105.124
139.166.186.162 58.70.144.219 244.58.75.243 80.19.71.133
229.115.210.53 113.54.19.236 64.95.163.241 155.13.30.216
69.92.32.154 89.27.88.112 173.239.197.213 234.148.156.102
35.229.246.157 135.194.122.233 249.15.115.164 29.247.43.209