Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.45.185.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.45.185.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:38:00 CST 2025
;; MSG SIZE  rcvd: 105
Host info
28.185.45.52.in-addr.arpa domain name pointer ec2-52-45-185-28.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.185.45.52.in-addr.arpa	name = ec2-52-45-185-28.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.94.231.185 attackspambots
(sshd) Failed SSH login from 189.94.231.185 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 11 12:48:37 iqdig9 sshd[11095]: Invalid user ubnt from 189.94.231.185
Sep 11 12:49:20 iqdig9 sshd[11478]: Invalid user admin from 189.94.231.185
Sep 11 12:49:22 iqdig9 sshd[11481]: Invalid user admin from 189.94.231.185
Sep 11 12:49:23 iqdig9 sshd[11487]: Invalid user admin from 189.94.231.185
Sep 11 12:49:25 iqdig9 sshd[11489]: Invalid user admin from 189.94.231.185
2020-09-13 02:56:03
196.52.43.109 attackspam
Automatic report - Banned IP Access
2020-09-13 03:28:23
161.35.11.118 attack
TCP port : 23546
2020-09-13 03:06:59
110.93.223.167 attackspambots
Estimation Services
2020-09-13 03:19:30
162.214.97.24 attackbotsspam
" "
2020-09-13 03:14:03
167.172.38.238 attackbots
 TCP (SYN) 167.172.38.238:44086 -> port 12063, len 44
2020-09-13 03:16:22
158.69.35.227 attackspambots
Invalid user geosolutions from 158.69.35.227 port 37152
2020-09-13 03:07:58
119.45.137.52 attackspambots
Sep 12 09:55:43 root sshd[16290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.137.52 
...
2020-09-13 03:06:06
202.62.58.110 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-13 03:24:46
86.247.118.135 attack
2020-09-11T16:01:01.764031morrigan.ad5gb.com sshd[970979]: Disconnected from authenticating user root 86.247.118.135 port 52724 [preauth]
2020-09-13 03:09:09
51.15.243.117 attackspam
Sep 12 18:43:33 localhost sshd[2671055]: Invalid user smmsp from 51.15.243.117 port 36080
Sep 12 18:43:33 localhost sshd[2671055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.243.117 
Sep 12 18:43:33 localhost sshd[2671055]: Invalid user smmsp from 51.15.243.117 port 36080
Sep 12 18:43:35 localhost sshd[2671055]: Failed password for invalid user smmsp from 51.15.243.117 port 36080 ssh2
Sep 12 18:47:13 localhost sshd[2678702]: Invalid user oracle from 51.15.243.117 port 48626
...
2020-09-13 03:24:16
162.243.233.102 attackspam
...
2020-09-13 03:10:20
213.181.174.69 attack
trying to access non-authorized port
2020-09-13 03:02:38
187.116.85.186 attack
Automatic report - Port Scan Attack
2020-09-13 03:05:36
112.85.42.89 attackbotsspam
Sep 13 00:19:12 dhoomketu sshd[3039840]: Failed password for root from 112.85.42.89 port 30555 ssh2
Sep 13 00:19:07 dhoomketu sshd[3039840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep 13 00:19:09 dhoomketu sshd[3039840]: Failed password for root from 112.85.42.89 port 30555 ssh2
Sep 13 00:19:12 dhoomketu sshd[3039840]: Failed password for root from 112.85.42.89 port 30555 ssh2
Sep 13 00:19:15 dhoomketu sshd[3039840]: Failed password for root from 112.85.42.89 port 30555 ssh2
...
2020-09-13 02:54:22

Recently Reported IPs

6.159.161.76 122.35.232.95 63.30.54.198 205.22.52.194
206.126.236.86 229.252.73.22 64.178.174.206 191.53.193.159
127.95.18.199 69.238.140.112 228.189.71.70 47.123.156.153
25.0.55.236 233.80.87.156 6.205.200.186 87.131.14.76
50.35.183.135 38.206.246.1 78.161.127.170 42.119.191.229