Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Amazon.com Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Automatic report generated by Wazuh
2019-09-07 20:05:05
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.46.44.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59248
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.46.44.173.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 07 20:04:50 CST 2019
;; MSG SIZE  rcvd: 116
Host info
173.44.46.52.in-addr.arpa domain name pointer server-52-46-44-173.mad51.r.cloudfront.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
173.44.46.52.in-addr.arpa	name = server-52-46-44-173.mad51.r.cloudfront.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.87.78.144 attackbots
email spam
2019-12-17 17:55:59
1.221.173.148 attack
email spam
2019-12-17 18:10:51
196.0.111.194 attackspam
email spam
2019-12-17 18:14:23
103.199.71.65 attack
email spam
2019-12-17 18:27:09
3.219.161.27 attackspambots
Port Scan
2019-12-17 18:10:23
186.24.6.35 attack
email spam
2019-12-17 18:18:41
49.88.112.64 attack
Dec 17 10:58:11 root sshd[7982]: Failed password for root from 49.88.112.64 port 23520 ssh2
Dec 17 10:58:14 root sshd[7982]: Failed password for root from 49.88.112.64 port 23520 ssh2
Dec 17 10:58:20 root sshd[7982]: Failed password for root from 49.88.112.64 port 23520 ssh2
Dec 17 10:58:24 root sshd[7982]: Failed password for root from 49.88.112.64 port 23520 ssh2
...
2019-12-17 18:05:05
128.199.252.169 attack
email spam
2019-12-17 18:24:28
45.55.136.206 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.136.206  user=root
Failed password for root from 45.55.136.206 port 41296 ssh2
Invalid user mrabti from 45.55.136.206 port 34177
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.136.206
Failed password for invalid user mrabti from 45.55.136.206 port 34177 ssh2
2019-12-17 18:08:25
179.108.48.34 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-17 18:20:13
91.144.142.19 attackspam
email spam
2019-12-17 18:00:05
103.61.198.234 attackspam
email spam
2019-12-17 17:56:47
41.87.198.76 attackbotsspam
email spam
2019-12-17 18:08:51
186.193.7.110 attack
email spam
2019-12-17 18:17:50
50.195.7.180 attackspam
email spam
2019-12-17 18:04:39

Recently Reported IPs

69.94.131.82 222.188.29.180 114.162.86.86 187.251.152.250
188.131.219.64 177.185.241.131 177.101.235.27 121.234.62.75
118.70.168.25 81.0.120.26 95.128.241.79 118.127.103.254
78.14.80.9 189.56.16.219 217.39.91.179 78.55.128.189
59.118.169.16 118.77.50.222 93.186.132.172 244.150.215.162