Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.42.55.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.42.55.71.			IN	A

;; AUTHORITY SECTION:
.			388	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021101300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 13 22:01:56 CST 2021
;; MSG SIZE  rcvd: 104
Host info
71.55.42.52.in-addr.arpa domain name pointer ec2-52-42-55-71.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
71.55.42.52.in-addr.arpa	name = ec2-52-42-55-71.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.134.179.57 attack
Apr  1 11:04:43 debian-2gb-nbg1-2 kernel: \[7990932.687514\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=52110 PROTO=TCP SPT=55981 DPT=3298 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-01 17:16:37
134.175.86.102 attack
2020-04-01 05:49:09,863 fail2ban.actions: WARNING [ssh] Ban 134.175.86.102
2020-04-01 17:43:37
187.174.219.142 attackbotsspam
[ssh] SSH attack
2020-04-01 17:42:03
103.195.5.51 attack
Mar 31 04:54:00 Tower sshd[31940]: refused connect from 106.13.181.170 (106.13.181.170)
Apr  1 03:25:14 Tower sshd[31940]: Connection from 103.195.5.51 port 48480 on 192.168.10.220 port 22 rdomain ""
Apr  1 03:25:15 Tower sshd[31940]: Failed password for root from 103.195.5.51 port 48480 ssh2
Apr  1 03:25:15 Tower sshd[31940]: Received disconnect from 103.195.5.51 port 48480:11: Bye Bye [preauth]
Apr  1 03:25:15 Tower sshd[31940]: Disconnected from authenticating user root 103.195.5.51 port 48480 [preauth]
2020-04-01 17:45:12
46.182.6.77 attack
Apr  1 09:53:36 master sshd[25593]: Failed password for root from 46.182.6.77 port 44616 ssh2
Apr  1 10:04:28 master sshd[25677]: Failed password for root from 46.182.6.77 port 51706 ssh2
Apr  1 10:11:56 master sshd[25720]: Failed password for root from 46.182.6.77 port 37500 ssh2
Apr  1 10:19:01 master sshd[25790]: Failed password for invalid user gw from 46.182.6.77 port 51954 ssh2
Apr  1 10:26:16 master sshd[25842]: Failed password for root from 46.182.6.77 port 38218 ssh2
Apr  1 10:33:17 master sshd[25911]: Failed password for root from 46.182.6.77 port 52686 ssh2
Apr  1 10:40:15 master sshd[25953]: Failed password for root from 46.182.6.77 port 38636 ssh2
2020-04-01 17:26:30
5.196.198.39 attack
firewall-block, port(s): 5060/udp
2020-04-01 17:09:39
188.166.42.120 attackspambots
Lines containing failures of 188.166.42.120
Apr  1 04:16:50 nextcloud sshd[25432]: Invalid user ha from 188.166.42.120 port 59092
Apr  1 04:16:50 nextcloud sshd[25432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.120
Apr  1 04:16:52 nextcloud sshd[25432]: Failed password for invalid user ha from 188.166.42.120 port 59092 ssh2
Apr  1 04:16:52 nextcloud sshd[25432]: Received disconnect from 188.166.42.120 port 59092:11: Bye Bye [preauth]
Apr  1 04:16:52 nextcloud sshd[25432]: Disconnected from invalid user ha 188.166.42.120 port 59092 [preauth]
Apr  1 04:29:48 nextcloud sshd[31713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.120  user=r.r
Apr  1 04:29:50 nextcloud sshd[31713]: Failed password for r.r from 188.166.42.120 port 50290 ssh2
Apr  1 04:29:50 nextcloud sshd[31713]: Received disconnect from 188.166.42.120 port 50290:11: Bye Bye [preauth]
Apr  1 04:29:50 ne........
------------------------------
2020-04-01 17:49:43
118.25.49.119 attackbotsspam
Apr  1 11:44:39 server sshd\[15029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.49.119  user=root
Apr  1 11:44:40 server sshd\[15029\]: Failed password for root from 118.25.49.119 port 32826 ssh2
Apr  1 12:04:51 server sshd\[19840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.49.119  user=root
Apr  1 12:04:53 server sshd\[19840\]: Failed password for root from 118.25.49.119 port 51400 ssh2
Apr  1 12:09:29 server sshd\[20942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.49.119  user=root
...
2020-04-01 17:28:08
178.128.247.181 attackbotsspam
$f2bV_matches
2020-04-01 17:31:04
222.129.132.53 attackbotsspam
Apr  1 03:47:02 powerpi2 sshd[16478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.129.132.53  user=root
Apr  1 03:47:04 powerpi2 sshd[16478]: Failed password for root from 222.129.132.53 port 58752 ssh2
Apr  1 03:49:31 powerpi2 sshd[16617]: Invalid user yangweifei from 222.129.132.53 port 45487
...
2020-04-01 17:28:46
163.172.49.56 attackspam
Invalid user alr from 163.172.49.56 port 58406
2020-04-01 17:10:26
115.75.10.222 attack
Unauthorized connection attempt from IP address 115.75.10.222 on Port 445(SMB)
2020-04-01 17:32:55
31.51.116.185 attackbots
Experienced a breach from this IP resulting in unauthorised Amazon gift card purchase.
2020-04-01 17:46:19
103.126.56.22 attack
Invalid user edl from 103.126.56.22 port 37720
2020-04-01 17:37:48
92.118.160.25 attackbotsspam
Automatic report - Banned IP Access
2020-04-01 17:55:54

Recently Reported IPs

45.172.126.203 118.27.36.56 2a00:102a:4010:9b63:f4b2:5479:6ada:a1 5.101.18.183
61.242.40.60 165.68.127.19 111.90.120.154 14.170.154.38
113.185.38.85 2400:2651:23a2:3300:6d71:b686:7719:d2da 153.125.126.158 14.168.40.242
171.253.28.216 2a09:bac0:23::815:b75 42.201.186.210 103.255.4.242
165.22.206.70 41.65.218.66 176.122.101.208 37.238.146.33