Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.39.223.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.39.223.194.			IN	A

;; AUTHORITY SECTION:
.			464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011901 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 20 05:41:27 CST 2020
;; MSG SIZE  rcvd: 117
Host info
194.223.39.52.in-addr.arpa domain name pointer ec2-52-39-223-194.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.223.39.52.in-addr.arpa	name = ec2-52-39-223-194.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.118.214.71 attack
Aug  4 23:11:14 debian sshd\[12934\]: Invalid user horace from 138.118.214.71 port 34608
Aug  4 23:11:14 debian sshd\[12934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.214.71
...
2019-08-05 06:33:13
107.170.235.19 attack
Automatic report - Banned IP Access
2019-08-05 05:41:41
94.34.223.130 attackbots
Autoban   94.34.223.130 AUTH/CONNECT
2019-08-05 05:37:46
94.176.189.156 attackbots
Autoban   94.176.189.156 AUTH/CONNECT
2019-08-05 05:54:27
94.176.189.147 attack
Autoban   94.176.189.147 AUTH/CONNECT
2019-08-05 05:56:40
106.52.230.77 attackbots
Aug  4 23:17:04 [munged] sshd[22653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.230.77
2019-08-05 05:45:06
94.152.197.165 attackspam
Autoban   94.152.197.165 AUTH/CONNECT
2019-08-05 06:39:11
185.125.216.16 attack
2019-08-04T11:57:27.113397Ingvass-Linux-Server sshd[1699]: Invalid user test from 185.125.216.16 port 56022
2019-08-04T11:57:31.156317Ingvass-Linux-Server sshd[1701]: Invalid user test from 185.125.216.16 port 56172
2019-08-04T11:57:35.238135Ingvass-Linux-Server sshd[1703]: Invalid user test from 185.125.216.16 port 56590
...
2019-08-05 05:18:19
51.75.25.164 attackbotsspam
Aug  4 23:10:51 SilenceServices sshd[1768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.25.164
Aug  4 23:10:52 SilenceServices sshd[1768]: Failed password for invalid user lxy from 51.75.25.164 port 33828 ssh2
Aug  4 23:17:07 SilenceServices sshd[5331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.25.164
2019-08-05 05:43:47
208.87.0.245 attack
SMB Server BruteForce Attack
2019-08-05 05:48:06
94.152.199.11 attackspam
Autoban   94.152.199.11 AUTH/CONNECT
2019-08-05 06:35:07
36.158.251.73 attackbotsspam
...
2019-08-05 06:35:38
94.176.189.159 attack
Autoban   94.176.189.159 AUTH/CONNECT
2019-08-05 05:52:56
94.60.81.89 attack
Autoban   94.60.81.89 AUTH/CONNECT
2019-08-05 05:32:35
94.187.53.147 attackspam
Autoban   94.187.53.147 AUTH/CONNECT
2019-08-05 05:49:41

Recently Reported IPs

13.39.255.115 119.86.39.82 1.78.88.7 151.28.254.53
37.166.254.63 63.114.139.237 220.157.229.163 97.188.90.88
121.227.31.174 206.64.144.229 211.207.84.254 66.148.2.241
116.112.51.145 17.102.178.130 14.200.206.47 58.221.7.174
119.36.143.239 35.124.111.161 183.146.253.178 76.80.133.14