Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.66.92.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.66.92.122.			IN	A

;; AUTHORITY SECTION:
.			557	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091501 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 01:48:40 CST 2022
;; MSG SIZE  rcvd: 105
Host info
122.92.66.52.in-addr.arpa domain name pointer ec2-52-66-92-122.ap-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.92.66.52.in-addr.arpa	name = ec2-52-66-92-122.ap-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
141.98.81.138 attackbots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2020-05-03 07:11:01
87.251.75.254 attackspam
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 80 proto: TCP cat: Attempted Information Leak
2020-05-03 06:49:54
45.79.110.218 attackspam
US_Linode_<177>1588459926 [1:2403350:56986] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 26 [Classification: Misc Attack] [Priority: 2]:  {TCP} 45.79.110.218:55223
2020-05-03 07:02:18
43.245.222.163 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 22 - port: 21025 proto: TCP cat: Misc Attack
2020-05-03 07:02:42
51.89.67.61 attackspam
ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak
2020-05-03 06:58:54
92.118.37.53 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 3384 proto: TCP cat: Misc Attack
2020-05-03 06:47:16
103.253.42.35 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 96 - port: 80 proto: TCP cat: Misc Attack
2020-05-03 06:42:00
13.35.253.67 attackspambots
ET INFO TLS Handshake Failure - port: 4708 proto: TCP cat: Potentially Bad Traffic
2020-05-03 07:04:15
138.68.82.194 attackbotsspam
2020-05-02T22:27:34.131897shield sshd\[24374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194  user=root
2020-05-02T22:27:36.208219shield sshd\[24374\]: Failed password for root from 138.68.82.194 port 41660 ssh2
2020-05-02T22:31:40.930412shield sshd\[25391\]: Invalid user bishop from 138.68.82.194 port 51348
2020-05-02T22:31:40.934933shield sshd\[25391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194
2020-05-02T22:31:43.116514shield sshd\[25391\]: Failed password for invalid user bishop from 138.68.82.194 port 51348 ssh2
2020-05-03 06:37:55
89.248.168.112 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 5555 proto: TCP cat: Misc Attack
2020-05-03 06:48:55
92.118.37.86 attackspambots
srv02 Mass scanning activity detected Target: 3398  ..
2020-05-03 06:46:16
98.126.7.234 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 1433 proto: TCP cat: Misc Attack
2020-05-03 06:43:11
92.118.161.17 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 2002 proto: TCP cat: Misc Attack
2020-05-03 06:44:59
185.216.140.252 attackspam
May  3 00:48:40 debian-2gb-nbg1-2 kernel: \[10718627.086743\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.216.140.252 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=60447 PROTO=TCP SPT=56728 DPT=1653 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-03 07:06:02
84.38.184.53 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 71 - port: 2440 proto: TCP cat: Misc Attack
2020-05-03 06:52:14

Recently Reported IPs

124.234.180.164 192.241.204.72 5.133.121.49 197.210.124.2
185.88.103.34 80.246.28.11 115.75.188.133 125.25.250.131
189.224.185.228 20.121.22.220 14.54.224.87 119.192.150.121
41.150.193.130 193.163.92.65 41.143.169.160 49.254.210.12
121.126.12.236 34.87.244.173 88.218.47.81 117.41.138.202