Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.2.148.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45902
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.2.148.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071401 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 15 11:20:19 CST 2019
;; MSG SIZE  rcvd: 116
Host info
139.148.2.52.in-addr.arpa domain name pointer ec2-52-2-148-139.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.148.2.52.in-addr.arpa	name = ec2-52-2-148-139.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.112.90.146 attackbots
Dec 22 21:50:11 web1 sshd\[5589\]: Invalid user schultze from 193.112.90.146
Dec 22 21:50:11 web1 sshd\[5589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.90.146
Dec 22 21:50:13 web1 sshd\[5589\]: Failed password for invalid user schultze from 193.112.90.146 port 58706 ssh2
Dec 22 21:56:07 web1 sshd\[6141\]: Invalid user dinny from 193.112.90.146
Dec 22 21:56:07 web1 sshd\[6141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.90.146
2019-12-23 16:21:15
222.186.175.217 attackspam
2019-12-23T08:18:29.648705hub.schaetter.us sshd\[32701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
2019-12-23T08:18:31.337872hub.schaetter.us sshd\[32701\]: Failed password for root from 222.186.175.217 port 50628 ssh2
2019-12-23T08:18:35.411851hub.schaetter.us sshd\[32701\]: Failed password for root from 222.186.175.217 port 50628 ssh2
2019-12-23T08:18:38.590676hub.schaetter.us sshd\[32701\]: Failed password for root from 222.186.175.217 port 50628 ssh2
2019-12-23T08:18:41.746778hub.schaetter.us sshd\[32701\]: Failed password for root from 222.186.175.217 port 50628 ssh2
...
2019-12-23 16:20:38
106.13.36.145 attack
Dec 22 21:47:39 eddieflores sshd\[7073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.145  user=root
Dec 22 21:47:40 eddieflores sshd\[7073\]: Failed password for root from 106.13.36.145 port 51780 ssh2
Dec 22 21:54:52 eddieflores sshd\[7647\]: Invalid user veen from 106.13.36.145
Dec 22 21:54:52 eddieflores sshd\[7647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.145
Dec 22 21:54:55 eddieflores sshd\[7647\]: Failed password for invalid user veen from 106.13.36.145 port 51024 ssh2
2019-12-23 16:05:56
183.82.118.131 attackbotsspam
Dec 23 08:38:42 localhost sshd\[21682\]: Invalid user hg from 183.82.118.131 port 35439
Dec 23 08:38:42 localhost sshd\[21682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.118.131
Dec 23 08:38:44 localhost sshd\[21682\]: Failed password for invalid user hg from 183.82.118.131 port 35439 ssh2
2019-12-23 16:01:29
182.254.172.159 attack
Dec 23 08:35:29 markkoudstaal sshd[11561]: Failed password for root from 182.254.172.159 port 39820 ssh2
Dec 23 08:39:57 markkoudstaal sshd[11922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.159
Dec 23 08:39:59 markkoudstaal sshd[11922]: Failed password for invalid user liana from 182.254.172.159 port 51344 ssh2
2019-12-23 15:42:07
222.186.180.9 attack
Dec 23 09:00:45 tux-35-217 sshd\[29574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Dec 23 09:00:47 tux-35-217 sshd\[29574\]: Failed password for root from 222.186.180.9 port 24796 ssh2
Dec 23 09:00:51 tux-35-217 sshd\[29574\]: Failed password for root from 222.186.180.9 port 24796 ssh2
Dec 23 09:01:05 tux-35-217 sshd\[29581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
...
2019-12-23 16:02:23
114.67.80.209 attack
Dec 23 08:40:45 vps691689 sshd[18032]: Failed password for root from 114.67.80.209 port 45310 ssh2
Dec 23 08:49:53 vps691689 sshd[18287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.209
...
2019-12-23 15:50:28
153.126.202.140 attackbots
Dec 22 20:45:23 tdfoods sshd\[1759\]: Invalid user huigeon from 153.126.202.140
Dec 22 20:45:23 tdfoods sshd\[1759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ik1-337-28636.vs.sakura.ne.jp
Dec 22 20:45:26 tdfoods sshd\[1759\]: Failed password for invalid user huigeon from 153.126.202.140 port 56170 ssh2
Dec 22 20:51:33 tdfoods sshd\[2326\]: Invalid user sartorius from 153.126.202.140
Dec 22 20:51:33 tdfoods sshd\[2326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ik1-337-28636.vs.sakura.ne.jp
2019-12-23 15:40:48
222.186.169.192 attackbotsspam
Dec 23 09:12:40 dedicated sshd[24805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Dec 23 09:12:42 dedicated sshd[24805]: Failed password for root from 222.186.169.192 port 44586 ssh2
2019-12-23 16:13:42
14.240.21.148 attackspambots
Unauthorized connection attempt detected from IP address 14.240.21.148 to port 445
2019-12-23 15:48:44
222.186.175.163 attack
Dec 23 08:43:47 dedicated sshd[20029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Dec 23 08:43:49 dedicated sshd[20029]: Failed password for root from 222.186.175.163 port 19602 ssh2
2019-12-23 16:01:12
222.187.200.229 attackspambots
Dec 23 13:29:20 lcl-usvr-02 sshd[4104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.187.200.229  user=root
Dec 23 13:29:22 lcl-usvr-02 sshd[4104]: Failed password for root from 222.187.200.229 port 59096 ssh2
...
2019-12-23 16:07:28
186.67.248.8 attack
Dec 23 07:29:34 MK-Soft-VM7 sshd[20604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.8 
Dec 23 07:29:36 MK-Soft-VM7 sshd[20604]: Failed password for invalid user qy from 186.67.248.8 port 54824 ssh2
...
2019-12-23 15:52:59
114.35.191.203 attackspam
Dec 23 07:29:25 debian-2gb-nbg1-2 kernel: \[735312.822246\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=114.35.191.203 DST=195.201.40.59 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=51758 DF PROTO=TCP SPT=51471 DPT=81 WINDOW=14520 RES=0x00 SYN URGP=0
2019-12-23 16:01:44
156.206.243.152 attack
DLink DSL Remote OS Command Injection Vulnerability, PTR: host-156.206.152.243-static.tedata.net.
2019-12-23 15:43:53

Recently Reported IPs

78.178.206.159 68.201.167.201 179.95.247.90 66.188.137.189
47.204.164.27 193.174.233.203 78.110.212.48 119.113.84.245
86.101.35.186 49.117.142.127 125.76.192.143 166.111.228.33
162.0.12.139 107.204.30.136 222.84.169.59 212.252.82.152
219.202.220.143 177.92.245.226 187.114.14.104 98.201.189.16