Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.61.136.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.61.136.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:37:24 CST 2025
;; MSG SIZE  rcvd: 105
Host info
29.136.61.52.in-addr.arpa domain name pointer ec2-52-61-136-29.us-gov-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.136.61.52.in-addr.arpa	name = ec2-52-61-136-29.us-gov-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.237.187.66 attackbots
Email rejected due to spam filtering
2020-06-05 20:56:49
49.235.216.127 attackbots
Fail2Ban
2020-06-05 20:54:45
106.13.116.203 attack
2020-06-05T11:52:55.832932randservbullet-proofcloud-66.localdomain sshd[3733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.116.203  user=root
2020-06-05T11:52:57.975621randservbullet-proofcloud-66.localdomain sshd[3733]: Failed password for root from 106.13.116.203 port 47658 ssh2
2020-06-05T12:03:22.389517randservbullet-proofcloud-66.localdomain sshd[3787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.116.203  user=root
2020-06-05T12:03:24.943297randservbullet-proofcloud-66.localdomain sshd[3787]: Failed password for root from 106.13.116.203 port 36286 ssh2
...
2020-06-05 20:51:10
168.194.13.19 attackspambots
Jun  5 13:55:11 eventyay sshd[5253]: Failed password for root from 168.194.13.19 port 45618 ssh2
Jun  5 13:59:23 eventyay sshd[5396]: Failed password for root from 168.194.13.19 port 49702 ssh2
...
2020-06-05 20:42:19
128.199.91.26 attack
20 attempts against mh-ssh on echoip
2020-06-05 20:27:37
35.200.203.6 attackbotsspam
35.200.203.6 (6.203.200.35.bc.googleusercontent.com), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-06-05 20:59:44
176.194.210.16 attackbotsspam
1591358600 - 06/05/2020 14:03:20 Host: 176.194.210.16/176.194.210.16 Port: 445 TCP Blocked
2020-06-05 20:55:43
217.80.182.81 attack
Lines containing failures of 217.80.182.81
Jun  5 13:49:07 meet sshd[17433]: Invalid user pi from 217.80.182.81 port 43074
Jun  5 13:49:07 meet sshd[17434]: Invalid user pi from 217.80.182.81 port 43076
Jun  5 13:49:09 meet sshd[17433]: Failed password for invalid user pi from 217.80.182.81 port 43074 ssh2
Jun  5 13:49:09 meet sshd[17434]: Failed password for invalid user pi from 217.80.182.81 port 43076 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.80.182.81
2020-06-05 20:30:00
46.105.41.101 attack
Email rejected due to spam filtering
2020-06-05 21:06:13
103.80.36.218 attackbotsspam
Jun  5 14:29:34 PorscheCustomer sshd[27284]: Failed password for root from 103.80.36.218 port 64814 ssh2
Jun  5 14:32:15 PorscheCustomer sshd[27392]: Failed password for root from 103.80.36.218 port 64396 ssh2
...
2020-06-05 21:01:17
35.200.168.65 attackbotsspam
Jun  5 14:01:12 eventyay sshd[5471]: Failed password for root from 35.200.168.65 port 60326 ssh2
Jun  5 14:02:32 eventyay sshd[5545]: Failed password for root from 35.200.168.65 port 48564 ssh2
...
2020-06-05 20:30:51
144.91.118.135 attackbots
Brute-Force
2020-06-05 21:08:01
181.30.28.120 attackspambots
Jun  5 13:00:31 ajax sshd[23535]: Failed password for root from 181.30.28.120 port 51656 ssh2
2020-06-05 20:33:28
68.183.39.136 attackspam
trying to access non-authorized port
2020-06-05 20:42:52
193.112.247.104 attackspam
Jun  5 14:01:36 amit sshd\[22033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.247.104  user=root
Jun  5 14:01:38 amit sshd\[22033\]: Failed password for root from 193.112.247.104 port 46800 ssh2
Jun  5 14:06:03 amit sshd\[18284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.247.104  user=root
...
2020-06-05 20:43:35

Recently Reported IPs

84.147.175.33 248.4.73.110 170.171.58.143 161.119.201.230
58.242.217.84 238.129.58.67 156.97.97.40 126.194.109.119
97.203.108.237 86.174.173.251 54.196.247.130 166.89.74.15
31.239.50.29 238.43.112.29 248.237.253.190 58.106.168.250
16.73.195.61 40.185.45.14 185.161.188.237 238.184.123.243