Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.39.65.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.39.65.129.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102901 1800 900 604800 86400

;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 03:39:52 CST 2019
;; MSG SIZE  rcvd: 116
Host info
129.65.39.52.in-addr.arpa domain name pointer ec2-52-39-65-129.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.65.39.52.in-addr.arpa	name = ec2-52-39-65-129.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.12.7 attackspambots
SSH Brute Force
2020-04-29 13:23:14
167.99.194.54 attackspambots
Apr 29 06:21:56 vpn01 sshd[19411]: Failed password for root from 167.99.194.54 port 49322 ssh2
...
2020-04-29 13:23:46
103.91.54.100 attackspambots
SSH Brute Force
2020-04-29 13:39:57
106.12.42.110 attackbots
SSH Brute Force
2020-04-29 13:09:44
182.61.176.200 attackbots
Apr 29 05:51:22 server sshd[18895]: Failed password for invalid user cameron from 182.61.176.200 port 38372 ssh2
Apr 29 05:55:15 server sshd[20013]: Failed password for invalid user mfg from 182.61.176.200 port 47276 ssh2
Apr 29 05:59:17 server sshd[21237]: Failed password for invalid user moodle from 182.61.176.200 port 56176 ssh2
2020-04-29 13:04:09
104.236.61.100 attackbots
SSH Brute Force
2020-04-29 13:31:37
142.44.185.242 attackspam
Apr 29 07:06:17 markkoudstaal sshd[23829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.185.242
Apr 29 07:06:19 markkoudstaal sshd[23829]: Failed password for invalid user adhi from 142.44.185.242 port 36890 ssh2
Apr 29 07:10:04 markkoudstaal sshd[24676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.185.242
2020-04-29 13:12:34
106.12.102.91 attackbots
SSH Brute Force
2020-04-29 13:25:19
116.247.81.99 attack
$f2bV_matches
2020-04-29 13:37:07
105.96.52.39 attackbots
SSH Brute Force
2020-04-29 13:26:04
106.12.177.51 attackbotsspam
SSH Brute Force
2020-04-29 13:17:51
106.12.128.114 attackbotsspam
SSH Brute Force
2020-04-29 13:22:21
106.12.48.30 attack
SSH Brute Force
2020-04-29 13:08:54
142.93.60.53 attackbots
Apr 29 07:06:34 v22018086721571380 sshd[27139]: Failed password for invalid user ubuntu from 142.93.60.53 port 49980 ssh2
2020-04-29 13:28:45
106.12.85.164 attackbots
SSH Brute Force
2020-04-29 13:07:24

Recently Reported IPs

70.168.3.216 218.134.25.162 59.151.92.84 122.155.201.19
148.72.232.133 233.181.73.25 236.75.208.82 66.189.107.72
203.190.44.21 26.89.207.76 49.48.42.38 49.44.199.26
239.255.56.37 45.148.10.68 138.94.4.190 4.161.232.181
161.114.73.8 15.19.211.193 57.68.29.94 55.73.150.65