Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
Type Details Datetime
spambots
52.5.70.31 - - [22/Apr/2019:18:27:34 +0800] "GET /index.php/2019/04/19/xiaomi_2019_04_19_en/ HTTP/1.1" 200 13454 "-" "Grammarly/1.0 (http://www.grammarly.com)"
2019-04-22 18:28:24
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.5.70.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52744
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.5.70.31.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 22 18:28:22 +08 2019
;; MSG SIZE  rcvd: 114

Host info
31.70.5.52.in-addr.arpa domain name pointer ec2-52-5-70-31.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
31.70.5.52.in-addr.arpa	name = ec2-52-5-70-31.compute-1.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
189.10.195.130 attackbots
Oct  2 21:23:47 *** sshd[27766]: Failed password for invalid user usuario from 189.10.195.130 port 46030 ssh2
2019-10-03 04:13:35
192.241.249.53 attackbots
Oct  2 17:56:32 srv206 sshd[21475]: Invalid user osram from 192.241.249.53
...
2019-10-03 03:53:25
111.231.219.142 attackbotsspam
ssh failed login
2019-10-03 04:16:14
117.34.74.220 attack
Unauthorised access (Oct  2) SRC=117.34.74.220 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=59292 TCP DPT=445 WINDOW=1024 SYN
2019-10-03 04:04:56
92.118.37.88 attack
3389/tcp 10004/tcp 10037/tcp...
[2019-09-12/30]847pkt,334pt.(tcp)
2019-10-03 04:29:38
222.186.175.183 attack
Oct  2 09:40:48 hpm sshd\[30802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Oct  2 09:40:50 hpm sshd\[30802\]: Failed password for root from 222.186.175.183 port 12026 ssh2
Oct  2 09:41:10 hpm sshd\[30825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Oct  2 09:41:12 hpm sshd\[30825\]: Failed password for root from 222.186.175.183 port 18314 ssh2
Oct  2 09:41:35 hpm sshd\[30825\]: Failed password for root from 222.186.175.183 port 18314 ssh2
2019-10-03 03:57:40
222.186.190.2 attackbots
10/02/2019-15:52:48.834273 222.186.190.2 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-03 03:58:55
149.202.65.173 attackspam
k+ssh-bruteforce
2019-10-03 04:26:11
134.175.59.235 attackbotsspam
2019-10-02T22:38:33.227129enmeeting.mahidol.ac.th sshd\[28065\]: Invalid user test from 134.175.59.235 port 60209
2019-10-02T22:38:33.241448enmeeting.mahidol.ac.th sshd\[28065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.59.235
2019-10-02T22:38:35.429068enmeeting.mahidol.ac.th sshd\[28065\]: Failed password for invalid user test from 134.175.59.235 port 60209 ssh2
...
2019-10-03 04:00:02
159.45.170.156 attack
3389BruteforceStormFW21
2019-10-03 04:25:44
5.9.18.204 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/5.9.18.204/ 
 DE - 1H : (277)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN24940 
 
 IP : 5.9.18.204 
 
 CIDR : 5.9.0.0/16 
 
 PREFIX COUNT : 70 
 
 UNIQUE IP COUNT : 1779712 
 
 
 WYKRYTE ATAKI Z ASN24940 :  
  1H - 4 
  3H - 6 
  6H - 7 
 12H - 12 
 24H - 25 
 
 DateTime : 2019-10-02 20:27:08 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-03 04:05:32
104.210.222.38 attack
SSH Brute-Force reported by Fail2Ban
2019-10-03 04:23:04
210.212.237.67 attack
$f2bV_matches
2019-10-03 04:12:09
160.153.147.152 attackbotsspam
REQUESTED PAGE: /xmlrpc.php
2019-10-03 03:57:22
95.170.205.151 attackbotsspam
Invalid user rafael from 95.170.205.151 port 48880
2019-10-03 04:33:30

Recently Reported IPs

184.114.47.203 186.212.157.210 201.37.136.234 193.210.247.12
84.138.47.142 53.84.237.64 104.131.180.157 77.247.109.66
143.204.91.141 170.148.145.40 177.78.87.164 49.142.28.210
217.90.74.175 122.91.240.62 91.188.244.201 85.29.60.18
4.142.150.10 76.75.149.18 121.126.191.141 195.154.44.253