Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (Republic of)

Internet Service Provider: Microsoft Corporation

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
 TCP (SYN) 52.231.54.27:40302 -> port 10543, len 44
2020-09-09 03:15:54
attack
firewall-block, port(s): 10543/tcp
2020-09-08 18:50:14
attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-03 15:19:59
attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-03 07:31:06
attack
Invalid user gxu from 52.231.54.27 port 50222
2020-08-22 06:32:42
attack
Invalid user sdc from 52.231.54.27 port 60754
2020-08-18 03:00:18
attackspam
Bruteforce detected by fail2ban
2020-08-09 13:31:46
attack
Aug  8 12:11:49 powerpi2 sshd[25114]: Failed password for root from 52.231.54.27 port 34916 ssh2
Aug  8 12:15:39 powerpi2 sshd[25277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.54.27  user=root
Aug  8 12:15:41 powerpi2 sshd[25277]: Failed password for root from 52.231.54.27 port 38840 ssh2
...
2020-08-08 22:41:52
attackbots
2020-08-01T05:23:44.879959devel sshd[13525]: Failed password for root from 52.231.54.27 port 56436 ssh2
2020-08-01T06:07:46.987838devel sshd[16800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.54.27  user=root
2020-08-01T06:07:48.951593devel sshd[16800]: Failed password for root from 52.231.54.27 port 34498 ssh2
2020-08-01 19:30:49
attackspambots
Jul 27 23:36:48 rancher-0 sshd[614736]: Invalid user songyawen from 52.231.54.27 port 56498
Jul 27 23:36:50 rancher-0 sshd[614736]: Failed password for invalid user songyawen from 52.231.54.27 port 56498 ssh2
...
2020-07-28 05:55:16
Comments on same subnet:
IP Type Details Datetime
52.231.54.157 attackspambots
 TCP (SYN) 52.231.54.157:52745 -> port 31250, len 44
2020-06-28 17:06:05
52.231.54.157 attackspambots
Jun 13 10:43:21 vpn01 sshd[14981]: Failed password for root from 52.231.54.157 port 49950 ssh2
...
2020-06-13 19:45:48
52.231.54.157 attack
SSH bruteforce
2020-06-09 15:36:55
52.231.54.157 attackbotsspam
Jun  4 07:01:28 cdc sshd[25772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.54.157  user=root
Jun  4 07:01:30 cdc sshd[25772]: Failed password for invalid user root from 52.231.54.157 port 39660 ssh2
2020-06-04 15:19:46
52.231.54.157 attackbotsspam
Jun  2 23:26:17 mx sshd[10808]: Failed password for root from 52.231.54.157 port 51398 ssh2
2020-06-03 12:51:52
52.231.54.157 attackbots
IP blocked
2020-05-21 03:41:45
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.231.54.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.231.54.27.			IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072702 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 28 05:55:12 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 27.54.231.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 27.54.231.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.148.241 attack
Jul 27 23:48:41 work-partkepr sshd\[25238\]: Invalid user www from 159.65.148.241 port 58134
Jul 27 23:48:41 work-partkepr sshd\[25238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.241
...
2019-07-28 08:11:54
142.93.198.86 attackbotsspam
Invalid user test7 from 142.93.198.86 port 36166
2019-07-28 08:12:14
106.39.44.11 attackspambots
Invalid user www from 106.39.44.11 port 63284
2019-07-28 07:48:34
46.101.223.241 attackspambots
Invalid user zabbix from 46.101.223.241 port 60510
2019-07-28 08:06:14
138.197.180.16 attack
Invalid user test9 from 138.197.180.16 port 47536
2019-07-28 08:13:24
139.59.226.82 attackspambots
Invalid user test3 from 139.59.226.82 port 51788
2019-07-28 08:13:08
200.72.247.114 attack
Unauthorized connection attempt from IP address 200.72.247.114 on Port 445(SMB)
2019-07-28 08:21:11
221.125.165.59 attackbots
Jul 28 01:10:58 fr01 sshd[14526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59  user=root
Jul 28 01:11:00 fr01 sshd[14526]: Failed password for root from 221.125.165.59 port 33702 ssh2
...
2019-07-28 07:41:56
113.160.249.111 attack
Unauthorized connection attempt from IP address 113.160.249.111 on Port 445(SMB)
2019-07-28 07:47:35
220.92.16.90 attackbots
Invalid user cron from 220.92.16.90 port 54024
2019-07-28 07:42:13
139.199.100.81 attackbotsspam
Invalid user helpdesk from 139.199.100.81 port 48730
2019-07-28 07:37:21
118.173.127.100 attackbotsspam
Invalid user admin from 118.173.127.100 port 37473
2019-07-28 07:46:31
186.139.17.25 attackspam
Invalid user backup from 186.139.17.25 port 59258
2019-07-28 08:10:29
138.99.133.130 attackspam
Invalid user oscar from 138.99.133.130 port 8050
2019-07-28 07:37:51
101.108.143.87 attackbots
Invalid user admin from 101.108.143.87 port 60911
2019-07-28 08:02:37

Recently Reported IPs

92.170.64.11 22.157.224.239 93.189.130.221 218.159.27.61
80.66.75.164 32.243.111.63 154.44.107.246 28.135.159.138
199.63.225.65 223.121.115.240 180.248.121.170 192.35.168.98
109.71.237.13 80.32.131.229 54.38.22.38 220.132.165.121
185.249.198.55 152.67.14.208 1.202.118.111 72.85.126.87