Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.45.225.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.45.225.68.			IN	A

;; AUTHORITY SECTION:
.			459	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011100 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 21:12:12 CST 2023
;; MSG SIZE  rcvd: 105
Host info
68.225.45.52.in-addr.arpa domain name pointer ec2-52-45-225-68.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.225.45.52.in-addr.arpa	name = ec2-52-45-225-68.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2.137.131.113 attackspam
Jan 10 22:02:00 vbuntu sshd[777]: refused connect from 113.red-2-137-131.dynamicip.rima-tde.net (2.137.131.113)
Jan 10 22:02:00 vbuntu sshd[778]: refused connect from 113.red-2-137-131.dynamicip.rima-tde.net (2.137.131.113)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=2.137.131.113
2020-01-11 09:16:56
203.110.179.26 attackbots
Jan 11 00:00:00 ovpn sshd\[2740\]: Invalid user mn from 203.110.179.26
Jan 11 00:00:00 ovpn sshd\[2740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.179.26
Jan 11 00:00:02 ovpn sshd\[2740\]: Failed password for invalid user mn from 203.110.179.26 port 49109 ssh2
Jan 11 00:03:25 ovpn sshd\[3645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.179.26  user=root
Jan 11 00:03:28 ovpn sshd\[3645\]: Failed password for root from 203.110.179.26 port 33936 ssh2
2020-01-11 08:43:41
196.52.43.115 attackspam
Unauthorized connection attempt detected from IP address 196.52.43.115 to port 9002
2020-01-11 09:03:50
178.62.12.192 attackspam
Jan 11 05:58:13 MK-Soft-VM7 sshd[5333]: Failed password for root from 178.62.12.192 port 55978 ssh2
...
2020-01-11 13:02:06
91.209.157.22 attack
Automatic report - Port Scan Attack
2020-01-11 08:49:08
106.12.86.205 attackspambots
Jan 10 23:28:40 vmanager6029 sshd\[16704\]: Invalid user system_admin123 from 106.12.86.205 port 57346
Jan 10 23:28:40 vmanager6029 sshd\[16704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205
Jan 10 23:28:42 vmanager6029 sshd\[16704\]: Failed password for invalid user system_admin123 from 106.12.86.205 port 57346 ssh2
2020-01-11 08:59:15
219.93.106.33 attackspambots
Invalid user admin from 219.93.106.33 port 50696
2020-01-11 08:53:08
218.92.0.164 attack
20/1/10@19:43:00: FAIL: Alarm-SSH address from=218.92.0.164
...
2020-01-11 08:43:09
218.92.0.172 attack
Jan 11 06:23:07 areeb-Workstation sshd[14036]: Failed password for root from 218.92.0.172 port 15036 ssh2
Jan 11 06:23:17 areeb-Workstation sshd[14036]: Failed password for root from 218.92.0.172 port 15036 ssh2
...
2020-01-11 09:06:22
106.202.114.21 attackspambots
$f2bV_matches
2020-01-11 13:05:17
76.171.216.201 attackspam
Automatic report - Port Scan Attack
2020-01-11 08:41:53
128.199.185.42 attackbotsspam
1578718787 - 01/11/2020 05:59:47 Host: 128.199.185.42/128.199.185.42 Port: 22 TCP Blocked
2020-01-11 13:02:23
67.55.92.89 attackbots
Jan 10 22:42:55 ns382633 sshd\[29536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89  user=root
Jan 10 22:42:56 ns382633 sshd\[29536\]: Failed password for root from 67.55.92.89 port 46550 ssh2
Jan 10 22:57:32 ns382633 sshd\[32057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89  user=root
Jan 10 22:57:34 ns382633 sshd\[32057\]: Failed password for root from 67.55.92.89 port 40688 ssh2
Jan 10 23:00:03 ns382633 sshd\[32342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89  user=root
2020-01-11 09:05:39
185.176.27.42 attackspam
01/10/2020-19:48:57.205533 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-11 08:58:22
62.234.105.16 attackspam
Invalid user bm from 62.234.105.16 port 43182
2020-01-11 09:18:22

Recently Reported IPs

21.251.104.182 72.162.24.237 91.199.102.224 205.241.57.212
198.209.147.182 192.196.177.71 185.174.241.224 17.198.239.81
167.148.231.126 163.73.159.140 142.94.15.82 14.5.171.199
138.33.166.117 132.138.178.144 125.13.159.60 123.219.108.38
119.196.168.211 116.199.88.118 187.243.53.229 137.210.227.126