Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.44.130.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.44.130.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 00:08:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
207.130.44.52.in-addr.arpa domain name pointer ec2-52-44-130-207.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.130.44.52.in-addr.arpa	name = ec2-52-44-130-207.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.114.68.142 attackbots
email spam
2019-12-17 18:07:36
201.139.88.58 attack
email spam
2019-12-17 18:13:37
36.37.180.59 attackspam
email spam
2019-12-17 18:39:18
202.5.61.24 attackbotsspam
proto=tcp  .  spt=48556  .  dpt=25  .     (Found on   Blocklist de  Dec 16)     (345)
2019-12-17 18:13:15
14.226.41.29 attack
email spam
2019-12-17 18:40:32
201.20.92.102 attack
proto=tcp  .  spt=43379  .  dpt=25  .     (Listed on    MailSpike (spam wave plus L3-L5) also unsubscore and rbldns-ru)     (250)
2019-12-17 18:13:48
31.45.240.154 attackspam
email spam
2019-12-17 18:39:40
159.203.43.43 attack
spam GFI
2019-12-17 18:22:01
112.26.44.112 attackspambots
Dec 17 10:32:19 * sshd[26028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.26.44.112
Dec 17 10:32:21 * sshd[26028]: Failed password for invalid user Passwort3@1 from 112.26.44.112 port 47537 ssh2
2019-12-17 18:26:32
196.0.111.194 attackspam
email spam
2019-12-17 18:14:23
213.6.66.242 attack
email spam
2019-12-17 18:12:45
95.77.104.79 attack
email spam
2019-12-17 18:28:32
82.204.141.94 attack
email spam
2019-12-17 18:34:09
45.143.98.152 attackspambots
email spam
2019-12-17 18:36:58
212.42.99.32 attackbots
email spam
2019-12-17 18:13:00

Recently Reported IPs

223.79.241.200 114.103.123.99 44.76.75.250 59.248.20.150
176.209.48.181 234.202.156.241 172.3.35.8 234.17.213.141
146.93.149.253 148.133.237.156 153.65.15.223 36.171.126.79
240.227.80.111 58.254.185.190 51.182.151.199 12.62.9.18
46.172.35.189 134.155.173.252 218.46.159.93 170.164.187.26