Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.215.224.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35650
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.215.224.242.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:28:12 CST 2022
;; MSG SIZE  rcvd: 107
Host info
242.224.215.52.in-addr.arpa domain name pointer ec2-52-215-224-242.eu-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.224.215.52.in-addr.arpa	name = ec2-52-215-224-242.eu-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.250.152.248 attack
Port probing on unauthorized port 23
2020-06-17 22:49:20
177.129.124.24 attack
$f2bV_matches
2020-06-17 23:08:24
182.77.51.73 attackbotsspam
Unauthorized connection attempt from IP address 182.77.51.73 on Port 445(SMB)
2020-06-17 23:10:57
134.255.234.21 attack
SSH Login Bruteforce
2020-06-17 23:12:51
181.129.165.139 attackbotsspam
Jun 17 16:47:23 server sshd[30118]: Failed password for invalid user wxl from 181.129.165.139 port 46770 ssh2
Jun 17 16:51:13 server sshd[1415]: Failed password for root from 181.129.165.139 port 46674 ssh2
Jun 17 16:55:05 server sshd[5104]: Failed password for backup from 181.129.165.139 port 46590 ssh2
2020-06-17 23:04:10
129.28.180.174 attackbots
$f2bV_matches
2020-06-17 22:53:47
42.159.121.246 attackspam
SSH Honeypot -> SSH Bruteforce / Login
2020-06-17 22:50:12
72.167.224.135 attackspam
Invalid user tomcat1 from 72.167.224.135 port 54886
2020-06-17 23:07:57
51.83.75.97 attackbotsspam
2020-06-17 14:21:01,363 fail2ban.actions        [937]: NOTICE  [sshd] Ban 51.83.75.97
2020-06-17 14:56:13,882 fail2ban.actions        [937]: NOTICE  [sshd] Ban 51.83.75.97
2020-06-17 15:29:36,320 fail2ban.actions        [937]: NOTICE  [sshd] Ban 51.83.75.97
2020-06-17 16:03:06,859 fail2ban.actions        [937]: NOTICE  [sshd] Ban 51.83.75.97
2020-06-17 16:36:37,844 fail2ban.actions        [937]: NOTICE  [sshd] Ban 51.83.75.97
...
2020-06-17 23:11:25
5.188.86.221 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-17T13:50:15Z and 2020-06-17T14:05:53Z
2020-06-17 22:53:29
54.37.86.192 attack
failed root login
2020-06-17 23:01:28
67.211.240.12 attackbots
SSH/22 MH Probe, BF, Hack -
2020-06-17 23:13:38
14.226.41.179 attackbotsspam
Unauthorized connection attempt from IP address 14.226.41.179 on Port 445(SMB)
2020-06-17 23:16:35
14.232.243.10 attack
SSH Bruteforce Attempt (failed auth)
2020-06-17 23:05:22
117.92.92.54 attack
From CCTV User Interface Log
...::ffff:117.92.92.54 - - [17/Jun/2020:08:03:09 +0000] "POST /HNAP1/ HTTP/1.0" 501 188
...
2020-06-17 22:46:52

Recently Reported IPs

180.251.93.40 99.155.87.2 34.90.174.85 103.165.22.187
14.224.48.50 188.170.159.30 190.180.154.9 194.156.125.175
200.236.97.195 223.152.183.191 103.82.77.168 193.39.89.124
121.54.32.107 121.206.153.98 80.87.194.27 92.253.93.127
114.32.108.55 43.154.147.88 213.186.145.50 151.232.109.147