Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.204.194.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.204.194.140.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060200 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 02 23:36:14 CST 2024
;; MSG SIZE  rcvd: 107
Host info
140.194.204.52.in-addr.arpa domain name pointer ec2-52-204-194-140.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.194.204.52.in-addr.arpa	name = ec2-52-204-194-140.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.191.84.38 attackbotsspam
Mar 21 20:24:43 jane sshd[19806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.84.38 
Mar 21 20:24:45 jane sshd[19806]: Failed password for invalid user admin from 94.191.84.38 port 55670 ssh2
...
2020-03-22 04:51:39
113.207.83.130 attack
Invalid user ofbiz from 113.207.83.130 port 52190
2020-03-22 04:41:28
136.243.26.248 spam
Mi mandano almeno 10 mail al giorno ,tutto spam mail truffe.
2020-03-22 04:40:57
58.71.15.10 attackbots
Invalid user tu from 58.71.15.10 port 49863
2020-03-22 05:00:49
134.209.96.131 attackbotsspam
$f2bV_matches
2020-03-22 04:33:08
117.201.250.194 attackspambots
Invalid user jira from 117.201.250.194 port 39910
2020-03-22 04:39:26
106.13.5.140 attack
Invalid user no from 106.13.5.140 port 14763
2020-03-22 04:44:07
95.110.154.101 attackbotsspam
Mar 22 01:29:52 gw1 sshd[27226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.154.101
Mar 22 01:29:55 gw1 sshd[27226]: Failed password for invalid user wrt from 95.110.154.101 port 47810 ssh2
...
2020-03-22 04:50:45
51.15.59.190 attack
Invalid user test from 51.15.59.190 port 36508
2020-03-22 05:06:09
118.26.22.50 attackspam
Invalid user amandabackup from 118.26.22.50 port 5951
2020-03-22 04:38:40
122.5.46.22 attack
Mar 21 20:56:31  sshd\[32293\]: Invalid user nq from 122.5.46.22Mar 21 20:56:34  sshd\[32293\]: Failed password for invalid user nq from 122.5.46.22 port 59686 ssh2
...
2020-03-22 04:36:11
101.251.211.238 attack
Mar 21 21:21:00 mout sshd[8429]: Invalid user ub from 101.251.211.238 port 43612
2020-03-22 04:50:07
46.105.149.168 attack
Mar 21 21:45:47 ArkNodeAT sshd\[18186\]: Invalid user test from 46.105.149.168
Mar 21 21:45:47 ArkNodeAT sshd\[18186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.149.168
Mar 21 21:45:49 ArkNodeAT sshd\[18186\]: Failed password for invalid user test from 46.105.149.168 port 33170 ssh2
2020-03-22 05:07:42
46.101.73.64 attack
SSH login attempts @ 2020-03-19 04:57:20
2020-03-22 05:08:09
47.220.235.64 attackspam
Invalid user testing from 47.220.235.64 port 43678
2020-03-22 05:07:29

Recently Reported IPs

153.45.66.141 139.20.35.235 221.130.228.44 32.255.9.149
131.229.67.248 154.240.161.13 203.210.247.100 44.158.5.101
191.193.121.20 110.135.251.50 253.40.53.121 17.34.35.70
249.123.150.158 129.150.35.237 64.204.235.217 77.239.230.37
55.36.193.240 150.132.254.185 163.253.55.83 171.50.241.77