Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.2.129.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63331
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.2.129.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022701 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 03:07:22 CST 2025
;; MSG SIZE  rcvd: 104
Host info
21.129.2.52.in-addr.arpa domain name pointer ec2-52-2-129-21.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.129.2.52.in-addr.arpa	name = ec2-52-2-129-21.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.89.171 attackbotsspam
Sep 21 02:39:45 wbs sshd\[30175\]: Invalid user oracle from 106.12.89.171
Sep 21 02:39:45 wbs sshd\[30175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.171
Sep 21 02:39:46 wbs sshd\[30175\]: Failed password for invalid user oracle from 106.12.89.171 port 58768 ssh2
Sep 21 02:44:08 wbs sshd\[30591\]: Invalid user dirsrv from 106.12.89.171
Sep 21 02:44:08 wbs sshd\[30591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.171
2019-09-21 20:51:56
106.12.87.197 attack
Sep 20 18:29:14 eddieflores sshd\[20297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.87.197  user=root
Sep 20 18:29:15 eddieflores sshd\[20297\]: Failed password for root from 106.12.87.197 port 35088 ssh2
Sep 20 18:35:11 eddieflores sshd\[20734\]: Invalid user ot from 106.12.87.197
Sep 20 18:35:11 eddieflores sshd\[20734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.87.197
Sep 20 18:35:13 eddieflores sshd\[20734\]: Failed password for invalid user ot from 106.12.87.197 port 47354 ssh2
2019-09-21 20:32:33
218.92.0.203 attack
Sep 21 04:55:07 venus sshd\[10878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
Sep 21 04:55:10 venus sshd\[10878\]: Failed password for root from 218.92.0.203 port 45717 ssh2
Sep 21 04:55:12 venus sshd\[10878\]: Failed password for root from 218.92.0.203 port 45717 ssh2
...
2019-09-21 20:44:16
125.141.139.157 attackspam
C1,WP GET /wordpress/wp-login.php
2019-09-21 20:53:03
145.239.102.181 attackbots
Sep 20 17:42:48 hiderm sshd\[11121\]: Invalid user temp from 145.239.102.181
Sep 20 17:42:48 hiderm sshd\[11121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip181.ip-145-239-102.eu
Sep 20 17:42:50 hiderm sshd\[11121\]: Failed password for invalid user temp from 145.239.102.181 port 50112 ssh2
Sep 20 17:46:44 hiderm sshd\[11648\]: Invalid user oracle from 145.239.102.181
Sep 20 17:46:44 hiderm sshd\[11648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip181.ip-145-239-102.eu
2019-09-21 20:23:20
46.38.144.202 attackspambots
Sep 21 14:03:20 vmanager6029 postfix/smtpd\[31529\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 14:05:43 vmanager6029 postfix/smtpd\[31529\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-21 20:09:15
139.59.95.216 attackbots
Sep 20 21:34:19 web1 sshd\[26288\]: Invalid user sonar from 139.59.95.216
Sep 20 21:34:19 web1 sshd\[26288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.216
Sep 20 21:34:21 web1 sshd\[26288\]: Failed password for invalid user sonar from 139.59.95.216 port 54214 ssh2
Sep 20 21:40:28 web1 sshd\[26959\]: Invalid user admin from 139.59.95.216
Sep 20 21:40:28 web1 sshd\[26959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.216
2019-09-21 20:18:18
167.71.237.250 attack
Sep 21 14:27:22 ArkNodeAT sshd\[4590\]: Invalid user tt from 167.71.237.250
Sep 21 14:27:22 ArkNodeAT sshd\[4590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.250
Sep 21 14:27:25 ArkNodeAT sshd\[4590\]: Failed password for invalid user tt from 167.71.237.250 port 58884 ssh2
2019-09-21 20:40:33
18.220.105.221 attackbots
Multiple failed RDP login attempts
2019-09-21 20:21:54
112.237.3.141 attack
Unauthorised access (Sep 21) SRC=112.237.3.141 LEN=40 TTL=49 ID=10565 TCP DPT=8080 WINDOW=61389 SYN
2019-09-21 20:23:50
124.163.214.106 attackbots
SSH bruteforce
2019-09-21 20:11:37
177.207.226.104 attackspambots
Sep 21 12:05:30 venus sshd\[20190\]: Invalid user n3xus1t from 177.207.226.104 port 48158
Sep 21 12:05:30 venus sshd\[20190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.207.226.104
Sep 21 12:05:32 venus sshd\[20190\]: Failed password for invalid user n3xus1t from 177.207.226.104 port 48158 ssh2
...
2019-09-21 20:22:45
180.250.210.165 attack
Sep 21 09:15:56 thevastnessof sshd[20453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.210.165
...
2019-09-21 20:35:22
51.75.123.85 attackbotsspam
Invalid user vbox from 51.75.123.85 port 36400
2019-09-21 20:49:13
51.38.242.210 attackbotsspam
Invalid user user from 51.38.242.210 port 48042
2019-09-21 20:07:53

Recently Reported IPs

78.211.10.53 214.29.152.56 73.147.135.143 122.241.152.105
14.58.100.152 210.161.166.190 70.104.119.24 173.236.9.186
25.19.57.63 29.158.51.154 127.250.23.243 108.156.187.205
13.142.110.224 12.27.41.4 67.44.80.240 150.129.168.195
164.55.98.167 216.65.125.250 188.78.20.120 161.221.232.234