Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.53.112.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8390
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.53.112.166.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 02 00:35:14 CST 2019
;; MSG SIZE  rcvd: 117
Host info
166.112.53.52.in-addr.arpa domain name pointer ec2-52-53-112-166.us-west-1.compute.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
166.112.53.52.in-addr.arpa	name = ec2-52-53-112-166.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.41.22.238 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-20 17:09:56
51.77.140.36 attack
Feb 20 06:35:57 vps647732 sshd[18925]: Failed password for root from 51.77.140.36 port 54778 ssh2
Feb 20 06:38:36 vps647732 sshd[18992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.36
...
2020-02-20 17:51:03
222.186.169.194 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Failed password for root from 222.186.169.194 port 53118 ssh2
Failed password for root from 222.186.169.194 port 53118 ssh2
Failed password for root from 222.186.169.194 port 53118 ssh2
Failed password for root from 222.186.169.194 port 53118 ssh2
2020-02-20 17:42:21
47.184.198.251 attackspambots
Feb 20 10:21:08 minden010 sshd[24490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.184.198.251
Feb 20 10:21:09 minden010 sshd[24490]: Failed password for invalid user ubuntu from 47.184.198.251 port 38908 ssh2
Feb 20 10:27:13 minden010 sshd[27271]: Failed password for nobody from 47.184.198.251 port 53816 ssh2
...
2020-02-20 17:53:10
5.135.177.2 attackspambots
Automatic report - XMLRPC Attack
2020-02-20 17:32:24
134.17.26.27 attackspam
Invalid user guest from 134.17.26.27 port 34134
2020-02-20 17:13:54
222.186.180.223 attack
Feb 20 14:37:55 gw1 sshd[32313]: Failed password for root from 222.186.180.223 port 14952 ssh2
Feb 20 14:38:06 gw1 sshd[32313]: Failed password for root from 222.186.180.223 port 14952 ssh2
...
2020-02-20 17:41:42
43.239.69.129 attack
[19.02.2020 16:30:41] Login failure for user system from 43.239.69.129
2020-02-20 17:37:43
218.92.0.211 attackspam
Fail2Ban Ban Triggered
2020-02-20 17:39:31
183.82.54.178 attackbotsspam
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-02-20 17:29:27
138.197.131.218 attack
Automatic report - SSH Brute-Force Attack
2020-02-20 17:11:15
52.83.45.206 attackspam
Invalid user dba from 52.83.45.206 port 58544
2020-02-20 17:12:03
78.167.75.86 attackspambots
Automatic report - Port Scan Attack
2020-02-20 17:35:16
159.192.183.182 attackbotsspam
1582174341 - 02/20/2020 05:52:21 Host: 159.192.183.182/159.192.183.182 Port: 445 TCP Blocked
2020-02-20 17:45:54
101.78.229.4 attack
SSH Brute Force
2020-02-20 17:33:19

Recently Reported IPs

96.60.209.243 84.21.20.158 106.52.142.17 183.247.132.225
86.36.73.190 201.187.42.169 15.153.255.244 170.78.98.8
109.81.156.70 114.96.62.253 120.161.214.60 105.12.35.197
185.224.130.150 141.37.111.216 157.89.116.47 179.189.202.130
8.27.252.83 106.111.160.97 88.0.184.127 3.170.106.134