Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.204.69.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19513
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.204.69.107.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 23:55:15 CST 2019
;; MSG SIZE  rcvd: 117

Host info
107.69.204.52.in-addr.arpa domain name pointer ec2-52-204-69-107.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
107.69.204.52.in-addr.arpa	name = ec2-52-204-69-107.compute-1.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
111.93.200.50 attackspambots
Aug 25 12:50:56 instance-2 sshd[12178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50 
Aug 25 12:50:57 instance-2 sshd[12178]: Failed password for invalid user yxh from 111.93.200.50 port 50957 ssh2
Aug 25 12:55:35 instance-2 sshd[12260]: Failed password for root from 111.93.200.50 port 55124 ssh2
2020-08-25 21:07:29
211.112.18.37 attackbotsspam
Invalid user liulei from 211.112.18.37 port 18662
2020-08-25 21:26:30
159.65.174.81 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-25 21:30:16
218.75.110.41 attackbotsspam
$f2bV_matches
2020-08-25 21:05:39
120.210.134.49 attackspam
Aug 25 18:23:36 gw1 sshd[18870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.210.134.49
Aug 25 18:23:38 gw1 sshd[18870]: Failed password for invalid user aaron from 120.210.134.49 port 56222 ssh2
...
2020-08-25 21:33:43
104.248.32.4 attack
Aug 25 **REMOVED** sshd\[3661\]: Invalid user admin from 104.248.32.4
Aug 25 **REMOVED** sshd\[3663\]: Invalid user admin from 104.248.32.4
Aug 25 **REMOVED** sshd\[3665\]: Invalid user ubuntu from 104.248.32.4
2020-08-25 21:38:08
42.159.80.91 attack
Aug 25 14:20:14 sso sshd[29379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.80.91
Aug 25 14:20:16 sso sshd[29379]: Failed password for invalid user test from 42.159.80.91 port 1344 ssh2
...
2020-08-25 21:25:11
139.59.3.170 attack
Invalid user yr from 139.59.3.170 port 35360
2020-08-25 21:31:48
111.229.75.27 attackspambots
Invalid user user from 111.229.75.27 port 37896
2020-08-25 21:34:45
107.175.95.101 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-25T13:14:55Z and 2020-08-25T13:15:44Z
2020-08-25 21:35:37
120.53.12.94 attackbotsspam
Invalid user james from 120.53.12.94 port 49784
2020-08-25 21:21:40
147.30.99.20 attackbots
1598356793 - 08/25/2020 13:59:53 Host: 147.30.99.20/147.30.99.20 Port: 445 TCP Blocked
2020-08-25 21:01:46
152.67.12.90 attackbots
Invalid user fw from 152.67.12.90 port 36394
2020-08-25 21:30:31
178.32.197.93 attackspam
srvr2: (mod_security) mod_security (id:920350) triggered by 178.32.197.93 (FR/-/cervantes.onyphe.io): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/25 15:02:50 [error] 3634#0: *72414 [client 178.32.197.93] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159836057067.336286"] [ref "o0,14v21,14"], client: 178.32.197.93, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-08-25 21:13:00
14.162.2.27 attackspambots
1598356777 - 08/25/2020 13:59:37 Host: 14.162.2.27/14.162.2.27 Port: 445 TCP Blocked
...
2020-08-25 21:14:32

Recently Reported IPs

36.168.101.232 192.151.170.160 153.250.53.117 193.57.40.30
69.152.174.86 207.27.2.151 86.227.189.231 167.60.58.186
119.20.229.180 172.61.42.222 159.69.246.59 132.122.134.248
76.114.174.190 4.73.228.0 74.157.220.42 94.252.183.77
142.55.228.160 205.106.156.164 217.92.224.119 216.81.192.202