Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.42.47.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.42.47.97.			IN	A

;; AUTHORITY SECTION:
.			271	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 203 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 04:46:56 CST 2022
;; MSG SIZE  rcvd: 104
Host info
97.47.42.52.in-addr.arpa domain name pointer ec2-52-42-47-97.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.47.42.52.in-addr.arpa	name = ec2-52-42-47-97.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.226.174.221 attackbotsspam
103.226.174.221 - - [02/Feb/2020:07:54:26 +0300] "POST /wp-login.php HTTP/1.1" 200 2568 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-02-02 16:46:32
111.229.31.134 attack
Tried sshing with brute force.
2020-02-02 16:52:59
171.14.157.237 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 16:46:00
58.37.57.125 attackbots
Unauthorized connection attempt detected from IP address 58.37.57.125 to port 2220 [J]
2020-02-02 17:23:32
118.165.90.14 attack
unauthorized connection attempt
2020-02-02 17:21:28
113.252.255.63 attackspam
Honeypot attack, port: 5555, PTR: 63-255-252-113-on-nets.com.
2020-02-02 17:00:48
110.138.150.17 attack
Honeypot attack, port: 445, PTR: 17.subnet110-138-150.speedy.telkom.net.id.
2020-02-02 17:02:41
113.167.84.52 attackspambots
Feb  2 05:54:08 MK-Soft-Root2 sshd[23556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.167.84.52 
Feb  2 05:54:10 MK-Soft-Root2 sshd[23556]: Failed password for invalid user Administrator from 113.167.84.52 port 50048 ssh2
...
2020-02-02 17:00:01
200.7.176.3 attack
REQUESTED PAGE: /HNAP1/
2020-02-02 16:56:28
119.247.82.74 attackspambots
Unauthorized connection attempt detected from IP address 119.247.82.74 to port 5555 [J]
2020-02-02 16:44:14
198.100.146.98 attackbots
Unauthorized connection attempt detected from IP address 198.100.146.98 to port 2220 [J]
2020-02-02 16:40:06
178.55.167.3 attackbots
Honeypot attack, port: 5555, PTR: 178-55-167-3.bb.dnainternet.fi.
2020-02-02 16:59:43
116.228.53.227 attack
Unauthorized connection attempt detected from IP address 116.228.53.227 to port 2220 [J]
2020-02-02 17:07:48
122.224.131.116 attackspam
Unauthorized connection attempt detected from IP address 122.224.131.116 to port 2220 [J]
2020-02-02 16:45:19
129.211.63.79 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-02 17:05:16

Recently Reported IPs

218.207.118.57 73.115.184.188 155.12.174.50 144.189.137.74
111.57.145.45 95.91.245.11 122.241.228.128 145.149.58.209
149.92.53.188 205.115.226.254 14.158.150.190 225.143.72.175
106.40.208.237 17.63.238.212 226.202.249.238 20.147.177.213
200.151.120.38 111.48.97.135 4.14.17.249 195.65.110.155