Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.53.127.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.53.127.214.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042801 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 10:53:16 CST 2020
;; MSG SIZE  rcvd: 117
Host info
214.127.53.52.in-addr.arpa domain name pointer ec2-52-53-127-214.us-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.127.53.52.in-addr.arpa	name = ec2-52-53-127-214.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
108.176.0.2 attackbotsspam
Sep 19 21:35:47 vps647732 sshd[9927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.176.0.2
Sep 19 21:35:49 vps647732 sshd[9927]: Failed password for invalid user pi from 108.176.0.2 port 56559 ssh2
...
2019-09-20 03:46:19
52.65.61.35 attack
Sep 19 12:46:19 lnxmail61 postfix/submission/smtpd[1143]: warning: [munged]:[52.65.61.35]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-20 03:22:34
95.71.137.72 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-09-20 03:47:04
193.47.72.15 attackbotsspam
Sep 19 19:31:32 localhost sshd\[125676\]: Invalid user ts3bot from 193.47.72.15 port 59514
Sep 19 19:31:32 localhost sshd\[125676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.72.15
Sep 19 19:31:34 localhost sshd\[125676\]: Failed password for invalid user ts3bot from 193.47.72.15 port 59514 ssh2
Sep 19 19:35:56 localhost sshd\[125863\]: Invalid user op from 193.47.72.15 port 52159
Sep 19 19:35:56 localhost sshd\[125863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.72.15
...
2019-09-20 03:41:23
114.31.240.50 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 11:45:59.
2019-09-20 03:29:28
128.199.142.138 attackspam
Sep 19 19:10:05 MK-Soft-VM6 sshd\[939\]: Invalid user uploader from 128.199.142.138 port 38178
Sep 19 19:10:05 MK-Soft-VM6 sshd\[939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
Sep 19 19:10:07 MK-Soft-VM6 sshd\[939\]: Failed password for invalid user uploader from 128.199.142.138 port 38178 ssh2
...
2019-09-20 03:32:48
77.247.110.125 attackspambots
\[2019-09-19 15:33:07\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-19T15:33:07.648-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="224000001148243625001",SessionID="0x7fcd8c0e1918",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.125/51376",ACLName="no_extension_match"
\[2019-09-19 15:34:03\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-19T15:34:03.569-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="24000001148443071002",SessionID="0x7fcd8c3a6b08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.125/65011",ACLName="no_extension_match"
\[2019-09-19 15:34:32\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-19T15:34:32.568-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="225000001148243625001",SessionID="0x7fcd8c0b7678",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.125/53
2019-09-20 03:42:13
104.244.72.251 attackbotsspam
Sep 19 17:14:23 thevastnessof sshd[16467]: Failed password for root from 104.244.72.251 port 43014 ssh2
...
2019-09-20 03:19:36
163.47.39.70 attackspam
Sep 19 11:06:45 mail sshd\[9915\]: Invalid user rails from 163.47.39.70
Sep 19 11:06:45 mail sshd\[9915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.39.70
...
2019-09-20 03:11:37
117.199.167.152 attackspambots
Unauthorized connection attempt from IP address 117.199.167.152 on Port 445(SMB)
2019-09-20 03:18:20
157.44.106.169 attackspam
Unauthorized connection attempt from IP address 157.44.106.169 on Port 445(SMB)
2019-09-20 03:26:48
45.119.150.47 attack
Unauthorized connection attempt from IP address 45.119.150.47 on Port 445(SMB)
2019-09-20 03:35:21
119.96.159.156 attackbots
Sep 20 02:04:13 webhost01 sshd[8639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.159.156
Sep 20 02:04:15 webhost01 sshd[8639]: Failed password for invalid user ln from 119.96.159.156 port 38842 ssh2
...
2019-09-20 03:33:10
104.248.30.249 attackspam
Sep 19 08:44:59 ny01 sshd[3004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249
Sep 19 08:45:01 ny01 sshd[3004]: Failed password for invalid user paula from 104.248.30.249 port 40220 ssh2
Sep 19 08:48:43 ny01 sshd[3635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249
2019-09-20 03:30:42
222.186.52.124 attackspambots
2019-09-19T19:39:18.377914abusebot-4.cloudsearch.cf sshd\[5176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.124  user=root
2019-09-20 03:39:38

Recently Reported IPs

75.35.238.151 2.99.181.155 92.143.129.43 49.251.50.129
95.74.220.130 27.73.242.127 134.19.151.45 109.2.134.78
216.86.221.211 122.194.103.16 110.198.157.84 1.120.76.36
47.195.167.20 106.12.216.155 208.112.226.56 42.52.212.104
233.116.210.30 241.135.15.254 245.12.84.145 245.40.28.187