Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.36.242.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.36.242.14.			IN	A

;; AUTHORITY SECTION:
.			177	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 13:15:23 CST 2022
;; MSG SIZE  rcvd: 105
Host info
14.242.36.52.in-addr.arpa domain name pointer ec2-52-36-242-14.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.242.36.52.in-addr.arpa	name = ec2-52-36-242-14.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.41.35.1 attack
ICMP MP Probe, Scan -
2019-10-04 00:27:01
105.16.138.5 attackbots
ICMP MP Probe, Scan -
2019-10-04 00:17:13
54.37.230.141 attackbots
Oct  3 12:44:17 ny01 sshd[19792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.230.141
Oct  3 12:44:19 ny01 sshd[19792]: Failed password for invalid user test from 54.37.230.141 port 58262 ssh2
Oct  3 12:48:35 ny01 sshd[20475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.230.141
2019-10-04 00:49:28
49.235.251.41 attackbots
Oct  3 15:47:02 vps691689 sshd[27956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.251.41
Oct  3 15:47:04 vps691689 sshd[27956]: Failed password for invalid user maxreg from 49.235.251.41 port 43774 ssh2
Oct  3 15:52:16 vps691689 sshd[28062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.251.41
...
2019-10-04 00:09:44
219.93.20.155 attackbotsspam
Automatic report - Banned IP Access
2019-10-04 00:34:53
175.158.50.174 attack
Oct  3 23:05:13 lcl-usvr-02 sshd[737]: Invalid user ftpuser from 175.158.50.174 port 13922
Oct  3 23:05:13 lcl-usvr-02 sshd[737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.158.50.174
Oct  3 23:05:13 lcl-usvr-02 sshd[737]: Invalid user ftpuser from 175.158.50.174 port 13922
Oct  3 23:05:14 lcl-usvr-02 sshd[737]: Failed password for invalid user ftpuser from 175.158.50.174 port 13922 ssh2
Oct  3 23:09:49 lcl-usvr-02 sshd[1842]: Invalid user eggbreaker2 from 175.158.50.174 port 8321
...
2019-10-04 00:55:02
61.189.48.146 attack
Automatic report - Banned IP Access
2019-10-04 00:32:14
37.11.130.93 attackbots
Automated reporting of SSH Vulnerability scanning
2019-10-04 00:35:52
137.25.101.102 attackbots
Oct  3 06:09:01 eddieflores sshd\[12348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137-025-101-102.res.spectrum.com  user=root
Oct  3 06:09:03 eddieflores sshd\[12348\]: Failed password for root from 137.25.101.102 port 46688 ssh2
Oct  3 06:13:37 eddieflores sshd\[12793\]: Invalid user bz from 137.25.101.102
Oct  3 06:13:37 eddieflores sshd\[12793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137-025-101-102.res.spectrum.com
Oct  3 06:13:39 eddieflores sshd\[12793\]: Failed password for invalid user bz from 137.25.101.102 port 59476 ssh2
2019-10-04 00:25:51
85.116.119.70 attack
Automated reporting of SSH Vulnerability scanning
2019-10-04 00:10:51
82.141.237.225 attack
Oct  3 17:53:20 dedicated sshd[13100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.141.237.225  user=backup
Oct  3 17:53:22 dedicated sshd[13100]: Failed password for backup from 82.141.237.225 port 25745 ssh2
2019-10-04 00:13:39
2607:f1c0:841:1700::44:d132 attackbots
Automatic report - XMLRPC Attack
2019-10-04 00:20:47
190.5.241.138 attackbotsspam
Oct  3 16:32:38 lnxded64 sshd[12948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.241.138
2019-10-04 00:44:43
105.16.115.8 attackspam
ICMP MP Probe, Scan -
2019-10-04 00:22:46
51.75.30.199 attackbotsspam
Oct  3 06:22:55 php1 sshd\[25772\]: Invalid user terraria_user from 51.75.30.199
Oct  3 06:22:55 php1 sshd\[25772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.ip-51-75-30.eu
Oct  3 06:22:57 php1 sshd\[25772\]: Failed password for invalid user terraria_user from 51.75.30.199 port 47899 ssh2
Oct  3 06:26:58 php1 sshd\[28287\]: Invalid user pt from 51.75.30.199
Oct  3 06:26:58 php1 sshd\[28287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.ip-51-75-30.eu
2019-10-04 00:36:11

Recently Reported IPs

41.50.126.13 42.152.84.137 144.24.27.185 70.252.164.223
195.188.46.172 213.246.148.171 90.29.11.42 123.73.56.136
129.39.253.246 150.142.177.165 188.123.209.126 56.136.211.175
179.10.176.1 207.2.155.55 139.161.7.57 159.232.150.240
121.108.89.191 127.27.224.165 47.138.29.255 213.55.83.68