Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.221.212.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.221.212.242.			IN	A

;; AUTHORITY SECTION:
.			581	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030201 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 05:21:57 CST 2020
;; MSG SIZE  rcvd: 118
Host info
242.212.221.52.in-addr.arpa domain name pointer ec2-52-221-212-242.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.212.221.52.in-addr.arpa	name = ec2-52-221-212-242.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.132.176.66 attack
Feb 27 09:08:44 localhost sshd\[6469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.132.176.66  user=root
Feb 27 09:08:47 localhost sshd\[6469\]: Failed password for root from 149.132.176.66 port 64761 ssh2
Feb 27 09:12:11 localhost sshd\[7106\]: Invalid user alex from 149.132.176.66 port 56658
Feb 27 09:12:11 localhost sshd\[7106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.132.176.66
2020-02-27 19:37:24
159.65.133.217 attackspambots
Feb 27 10:48:08 zeus sshd[13700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.133.217 
Feb 27 10:48:10 zeus sshd[13700]: Failed password for invalid user redmine from 159.65.133.217 port 54008 ssh2
Feb 27 10:52:36 zeus sshd[13790]: Failed password for root from 159.65.133.217 port 38092 ssh2
2020-02-27 19:01:38
46.101.184.111 attackspambots
Feb 26 16:01:57 lamijardin sshd[28359]: Did not receive identification string from 46.101.184.111
Feb 26 16:02:12 lamijardin sshd[28360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.184.111  user=r.r
Feb 26 16:02:14 lamijardin sshd[28360]: Failed password for r.r from 46.101.184.111 port 45896 ssh2
Feb 26 16:02:14 lamijardin sshd[28360]: Received disconnect from 46.101.184.111 port 45896:11: Normal Shutdown, Thank you for playing [preauth]
Feb 26 16:02:14 lamijardin sshd[28360]: Disconnected from 46.101.184.111 port 45896 [preauth]
Feb 26 16:02:25 lamijardin sshd[28362]: Invalid user oracle from 46.101.184.111
Feb 26 16:02:25 lamijardin sshd[28362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.184.111
Feb 26 16:02:28 lamijardin sshd[28362]: Failed password for invalid user oracle from 46.101.184.111 port 42176 ssh2
Feb 26 16:02:28 lamijardin sshd[28362]: Received disconn........
-------------------------------
2020-02-27 19:19:51
103.134.133.38 attackbotsspam
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-27 19:22:02
149.202.164.82 attackbots
Feb 27 02:31:24 server sshd\[27383\]: Failed password for invalid user redbot from 149.202.164.82 port 44978 ssh2
Feb 27 08:33:38 server sshd\[7203\]: Invalid user scarab from 149.202.164.82
Feb 27 08:33:38 server sshd\[7203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 
Feb 27 08:33:40 server sshd\[7203\]: Failed password for invalid user scarab from 149.202.164.82 port 36824 ssh2
Feb 27 08:43:21 server sshd\[9308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82  user=nagios
...
2020-02-27 19:44:36
71.6.232.5 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-27 19:40:54
167.99.75.174 attackbots
Feb 27 11:04:13 freya sshd[26375]: Disconnected from invalid user test 167.99.75.174 port 42530 [preauth]
Feb 27 11:07:52 freya sshd[26881]: Invalid user oracle from 167.99.75.174 port 40308
Feb 27 11:07:52 freya sshd[26881]: Disconnected from invalid user oracle 167.99.75.174 port 40308 [preauth]
Feb 27 11:11:30 freya sshd[27527]: Invalid user ubuntu from 167.99.75.174 port 38108
Feb 27 11:11:31 freya sshd[27527]: Disconnected from invalid user ubuntu 167.99.75.174 port 38108 [preauth]
...
2020-02-27 19:13:54
207.154.210.84 attack
port
2020-02-27 19:17:09
62.224.59.231 attackspambots
Lines containing failures of 62.224.59.231
Feb 26 08:57:15 shared09 sshd[30943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.224.59.231  user=r.r
Feb 26 08:57:17 shared09 sshd[30943]: Failed password for r.r from 62.224.59.231 port 51381 ssh2
Feb 26 08:57:17 shared09 sshd[30943]: Received disconnect from 62.224.59.231 port 51381:11: Bye Bye [preauth]
Feb 26 08:57:17 shared09 sshd[30943]: Disconnected from authenticating user r.r 62.224.59.231 port 51381 [preauth]
Feb 26 09:15:50 shared09 sshd[3737]: Invalid user windowserver from 62.224.59.231 port 42967
Feb 26 09:15:50 shared09 sshd[3737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.224.59.231
Feb 26 09:15:52 shared09 sshd[3737]: Failed password for invalid user windowserver from 62.224.59.231 port 42967 ssh2
Feb 26 09:15:52 shared09 sshd[3737]: Received disconnect from 62.224.59.231 port 42967:11: Bye Bye [preauth]
Feb 26 09:1........
------------------------------
2020-02-27 19:11:27
90.74.128.212 attack
Brute force attempt
2020-02-27 19:34:39
49.88.112.60 attackspambots
scan r
2020-02-27 19:04:51
222.186.175.183 attackbotsspam
Feb 27 16:40:55 gw1 sshd[15976]: Failed password for root from 222.186.175.183 port 2440 ssh2
Feb 27 16:41:05 gw1 sshd[15976]: Failed password for root from 222.186.175.183 port 2440 ssh2
...
2020-02-27 19:41:59
212.93.154.120 attack
DATE:2020-02-27 06:42:00, IP:212.93.154.120, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-27 19:04:01
222.186.180.17 attack
Feb 27 12:27:20 dedicated sshd[8042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Feb 27 12:27:22 dedicated sshd[8042]: Failed password for root from 222.186.180.17 port 47916 ssh2
2020-02-27 19:29:35
78.187.140.34 attackbotsspam
Honeypot attack, port: 445, PTR: 78.187.140.34.dynamic.ttnet.com.tr.
2020-02-27 19:32:07

Recently Reported IPs

156.220.167.250 76.109.135.167 183.82.101.237 14.100.72.53
58.240.31.232 177.37.145.56 212.73.90.161 202.159.28.2
72.246.216.1 123.21.150.38 125.176.116.182 223.228.165.138
88.199.175.231 200.214.44.204 74.110.235.36 179.233.135.40
103.73.236.107 176.140.48.30 185.26.9.199 93.248.120.2