Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: Amazon Data Services Singapore

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
Oct 16 19:28:14 h2034429 sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.221.54.107  user=r.r
Oct 16 19:28:18 h2034429 sshd[24532]: Failed password for r.r from 52.221.54.107 port 41264 ssh2
Oct 16 19:28:18 h2034429 sshd[24532]: Received disconnect from 52.221.54.107 port 41264:11: Bye Bye [preauth]
Oct 16 19:28:18 h2034429 sshd[24532]: Disconnected from 52.221.54.107 port 41264 [preauth]
Oct 16 19:37:04 h2034429 sshd[24720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.221.54.107  user=r.r
Oct 16 19:37:06 h2034429 sshd[24720]: Failed password for r.r from 52.221.54.107 port 44804 ssh2
Oct 16 19:37:06 h2034429 sshd[24720]: Received disconnect from 52.221.54.107 port 44804:11: Bye Bye [preauth]
Oct 16 19:37:06 h2034429 sshd[24720]: Disconnected from 52.221.54.107 port 44804 [preauth]
Oct 16 19:42:44 h2034429 sshd[24847]: Invalid user marlie from 52.221.54.107
Oct 16 19:4........
-------------------------------
2019-10-21 04:56:55
attackbotsspam
Oct 20 12:35:37 pornomens sshd\[27599\]: Invalid user info from 52.221.54.107 port 36706
Oct 20 12:35:37 pornomens sshd\[27599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.221.54.107
Oct 20 12:35:39 pornomens sshd\[27599\]: Failed password for invalid user info from 52.221.54.107 port 36706 ssh2
...
2019-10-20 19:25:19
attack
Oct 19 06:38:53 MK-Soft-VM5 sshd[8013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.221.54.107 
Oct 19 06:38:55 MK-Soft-VM5 sshd[8013]: Failed password for invalid user super836 from 52.221.54.107 port 41086 ssh2
...
2019-10-19 16:20:18
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.221.54.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.221.54.107.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101800 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 18 16:54:56 CST 2019
;; MSG SIZE  rcvd: 117
Host info
107.54.221.52.in-addr.arpa domain name pointer ec2-52-221-54-107.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.54.221.52.in-addr.arpa	name = ec2-52-221-54-107.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.245.20.247 attack
Dec 27 07:25:57 vpn01 sshd[10180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.245.20.247
Dec 27 07:25:59 vpn01 sshd[10180]: Failed password for invalid user admin from 171.245.20.247 port 55048 ssh2
...
2019-12-27 18:18:29
1.34.194.100 attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(12271226)
2019-12-27 18:26:48
112.85.42.180 attack
Dec 27 11:30:26 dedicated sshd[28681]: Failed password for root from 112.85.42.180 port 59855 ssh2
Dec 27 11:30:29 dedicated sshd[28681]: Failed password for root from 112.85.42.180 port 59855 ssh2
Dec 27 11:30:33 dedicated sshd[28681]: Failed password for root from 112.85.42.180 port 59855 ssh2
Dec 27 11:30:39 dedicated sshd[28681]: Failed password for root from 112.85.42.180 port 59855 ssh2
Dec 27 11:30:42 dedicated sshd[28681]: Failed password for root from 112.85.42.180 port 59855 ssh2
2019-12-27 18:50:11
209.141.58.188 attackspambots
US email_SPAM
2019-12-27 18:33:56
142.4.208.165 attack
Dec 27 09:59:40 cavern sshd[17773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.208.165
2019-12-27 18:28:59
222.186.180.6 attack
Dec 27 11:30:41 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
Dec 27 11:30:44 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
Dec 27 11:30:47 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
Dec 27 11:30:50 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
...
2019-12-27 18:47:22
134.209.11.199 attackspambots
Dec 27 07:23:09 minden010 sshd[27604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.11.199
Dec 27 07:23:12 minden010 sshd[27604]: Failed password for invalid user georgiana from 134.209.11.199 port 60906 ssh2
Dec 27 07:26:08 minden010 sshd[28657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.11.199
...
2019-12-27 18:12:57
49.206.225.114 attackbots
Host Scan
2019-12-27 18:20:41
110.138.151.245 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-12-2019 06:25:15.
2019-12-27 18:52:04
152.136.122.130 attack
Dec 27 11:34:41 MK-Soft-Root1 sshd[4724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.130 
Dec 27 11:34:43 MK-Soft-Root1 sshd[4724]: Failed password for invalid user ashley1234567 from 152.136.122.130 port 45390 ssh2
...
2019-12-27 18:48:02
116.247.101.206 attackspambots
Dec 27 08:27:05 MK-Soft-Root1 sshd[29095]: Failed password for news from 116.247.101.206 port 35908 ssh2
...
2019-12-27 18:28:21
77.236.195.122 attackspambots
Port 22 Scan, PTR: 77-236-195-122.static.edera.cz.
2019-12-27 18:11:21
49.234.15.105 attackspambots
Dec 27 07:30:19 ws19vmsma01 sshd[56699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.15.105
Dec 27 07:30:21 ws19vmsma01 sshd[56699]: Failed password for invalid user server from 49.234.15.105 port 57922 ssh2
...
2019-12-27 18:38:59
61.177.172.128 attackspambots
2019-12-27T11:21:36.246386ns386461 sshd\[15181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
2019-12-27T11:21:38.235776ns386461 sshd\[15181\]: Failed password for root from 61.177.172.128 port 47343 ssh2
2019-12-27T11:21:41.905580ns386461 sshd\[15181\]: Failed password for root from 61.177.172.128 port 47343 ssh2
2019-12-27T11:21:45.122575ns386461 sshd\[15181\]: Failed password for root from 61.177.172.128 port 47343 ssh2
2019-12-27T11:21:48.084768ns386461 sshd\[15181\]: Failed password for root from 61.177.172.128 port 47343 ssh2
...
2019-12-27 18:23:21
103.62.235.6 attack
Host Scan
2019-12-27 18:25:14

Recently Reported IPs

94.243.140.162 188.98.236.190 154.221.20.221 113.108.126.4
119.126.162.60 89.168.165.209 31.163.151.99 72.31.40.122
188.150.173.73 117.225.240.204 183.237.67.146 138.197.133.73
77.172.17.226 54.208.201.249 89.46.109.231 200.110.176.6
111.40.55.194 114.113.238.22 77.243.191.124 220.142.51.136