Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dublin

Region: Leinster

Country: Ireland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       52.192.0.0 - 52.223.191.255
CIDR:           52.216.0.0/14, 52.223.128.0/18, 52.223.0.0/17, 52.220.0.0/15, 52.222.0.0/16, 52.208.0.0/13, 52.192.0.0/12
NetName:        AT-88-Z
NetHandle:      NET-52-192-0-0-1
Parent:         NET52 (NET-52-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amazon Technologies Inc. (AT-88-Z)
RegDate:        2015-09-02
Updated:        2020-09-24
Ref:            https://rdap.arin.net/registry/ip/52.192.0.0



OrgName:        Amazon Technologies Inc.
OrgId:          AT-88-Z
Address:        410 Terry Ave N.
City:           Seattle
StateProv:      WA
PostalCode:     98109
Country:        US
RegDate:        2011-12-08
Updated:        2024-01-24
Comment:        All abuse reports MUST include:
Comment:        * src IP
Comment:        * dest IP (your IP)
Comment:        * dest port
Comment:        * Accurate date/timestamp and timezone of activity
Comment:        * Intensity/frequency (short log extracts)
Comment:        * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref:            https://rdap.arin.net/registry/entity/AT-88-Z


OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

# end


# start

NetRange:       52.208.0.0 - 52.215.255.255
CIDR:           52.208.0.0/13
NetName:        AMAZON-DUB
NetHandle:      NET-52-208-0-0-1
Parent:         AT-88-Z (NET-52-192-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Amazon Data Services Ireland Limited (ADSIL-1)
RegDate:        2015-12-14
Updated:        2015-12-14
Ref:            https://rdap.arin.net/registry/ip/52.208.0.0



OrgName:        Amazon Data Services Ireland Limited
OrgId:          ADSIL-1
Address:        Unit 4033, Citywest Avenue Citywest Business Park
City:           Dublin
StateProv:      D24
PostalCode:     
Country:        IE
RegDate:        2014-07-18
Updated:        2014-07-18
Ref:            https://rdap.arin.net/registry/entity/ADSIL-1


OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.208.40.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.208.40.54.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 13:00:39 CST 2026
;; MSG SIZE  rcvd: 105
Host info
54.40.208.52.in-addr.arpa domain name pointer ec2-52-208-40-54.eu-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.40.208.52.in-addr.arpa	name = ec2-52-208-40-54.eu-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.244.15.151 attack
(sshd) Failed SSH login from 124.244.15.151 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 12 16:42:57 server2 sshd[11915]: Invalid user admin from 124.244.15.151
Oct 12 16:42:59 server2 sshd[11915]: Failed password for invalid user admin from 124.244.15.151 port 39223 ssh2
Oct 12 16:43:01 server2 sshd[11935]: Invalid user admin from 124.244.15.151
Oct 12 16:43:03 server2 sshd[11935]: Failed password for invalid user admin from 124.244.15.151 port 39329 ssh2
Oct 12 16:43:04 server2 sshd[12221]: Invalid user admin from 124.244.15.151
2020-10-14 04:34:01
80.82.64.73 attackbots
[MultiHost/MultiPort scan (8)] tcp/110, tcp/135, tcp/143, tcp/20, tcp/21, tcp/22, tcp/23, tcp/81
[scan/connect: 10 time(s)]
*(RWIN=1024)(10130956)
2020-10-14 04:33:11
49.233.135.204 attack
Oct 13 14:22:00 Invalid user kramer from 49.233.135.204 port 48416
2020-10-14 04:35:17
45.129.33.15 attack
ET DROP Dshield Block Listed Source group 1 - port: 3531 proto: tcp cat: Misc Attackbytes: 60
2020-10-14 04:56:00
104.131.55.236 attackspambots
Oct 14 05:08:59 localhost sshd[3675128]: Invalid user poornendu from 104.131.55.236 port 37530
...
2020-10-14 04:31:49
49.88.112.113 attackspambots
Lots of Login attempts to root account
2020-10-14 04:32:20
87.12.192.215 attackbotsspam
Port Scan
...
2020-10-14 04:35:05
112.85.42.183 attackbotsspam
$f2bV_matches
2020-10-14 04:55:32
194.87.139.188 attackbots
164.68.126.225 194.87.139.188 [13/Oct/2020:19:20:38 +0200] "GET //phpMyAdmin/scripts/setup.php HTTP/1.1" 301 532 "-" "-"
164.68.126.225 194.87.139.188 [13/Oct/2020:19:20:38 +0200] "GET //phpmyadmin/scripts/setup.php HTTP/1.1" 301 532 "-" "-"
164.68.126.225 194.87.139.188 [13/Oct/2020:19:20:38 +0200] "GET //pma/scripts/setup.php HTTP/1.1" 301 518 "-" "-"
2020-10-14 04:39:49
112.85.42.230 attackbotsspam
Oct 13 20:25:20 game-panel sshd[19716]: Failed password for root from 112.85.42.230 port 63944 ssh2
Oct 13 20:25:23 game-panel sshd[19716]: Failed password for root from 112.85.42.230 port 63944 ssh2
Oct 13 20:25:26 game-panel sshd[19716]: Failed password for root from 112.85.42.230 port 63944 ssh2
Oct 13 20:25:30 game-panel sshd[19716]: Failed password for root from 112.85.42.230 port 63944 ssh2
2020-10-14 04:26:44
178.128.221.162 attack
(sshd) Failed SSH login from 178.128.221.162 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 13 14:20:59 server sshd[29729]: Invalid user patrickc from 178.128.221.162 port 52266
Oct 13 14:21:01 server sshd[29729]: Failed password for invalid user patrickc from 178.128.221.162 port 52266 ssh2
Oct 13 14:29:44 server sshd[31896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.162  user=root
Oct 13 14:29:46 server sshd[31896]: Failed password for root from 178.128.221.162 port 48820 ssh2
Oct 13 14:33:28 server sshd[407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.162  user=root
2020-10-14 04:40:28
150.158.198.131 attackbots
Oct 13 15:02:14  sshd\[16148\]: Invalid user victorino from 150.158.198.131Oct 13 15:02:16  sshd\[16148\]: Failed password for invalid user victorino from 150.158.198.131 port 48690 ssh2
...
2020-10-14 04:22:10
212.252.106.196 attackspam
Oct 13 21:30:34 mail sshd[3387]: Failed password for root from 212.252.106.196 port 56385 ssh2
...
2020-10-14 04:28:56
47.88.228.246 attackbotsspam
Oct 12 22:35:07 PorscheCustomer sshd[9876]: Failed password for root from 47.88.228.246 port 47004 ssh2
Oct 12 22:39:01 PorscheCustomer sshd[10010]: Failed password for root from 47.88.228.246 port 52806 ssh2
...
2020-10-14 04:47:48
36.133.109.23 attack
(sshd) Failed SSH login from 36.133.109.23 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 13 15:17:08 optimus sshd[28348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.109.23  user=root
Oct 13 15:17:11 optimus sshd[28348]: Failed password for root from 36.133.109.23 port 45542 ssh2
Oct 13 15:21:17 optimus sshd[29725]: Invalid user dmsdb from 36.133.109.23
Oct 13 15:21:17 optimus sshd[29725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.109.23 
Oct 13 15:21:19 optimus sshd[29725]: Failed password for invalid user dmsdb from 36.133.109.23 port 44838 ssh2
2020-10-14 04:33:38

Recently Reported IPs

45.156.129.103 45.156.129.100 27.205.179.155 66.227.96.195
171.113.105.48 223.104.124.112 61.166.210.53 221.13.93.113
118.212.121.58 15.9.0.167 3.254.70.213 103.96.1.160
10.50.0.62 225.67.122.218 27.47.42.237 27.47.42.85
212.135.214.5 61.48.133.81 34.38.53.187 38.55.172.148