Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.68.29.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.68.29.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 21:40:20 CST 2025
;; MSG SIZE  rcvd: 104
Host info
39.29.68.52.in-addr.arpa domain name pointer ec2-52-68-29-39.ap-northeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.29.68.52.in-addr.arpa	name = ec2-52-68-29-39.ap-northeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.128.120.35 attackbots
10222/tcp
[2020-06-08]1pkt
2020-06-08 16:04:23
92.63.197.95 attackbotsspam
Jun  8 10:42:23 debian kernel: [504700.866668] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=92.63.197.95 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=41984 PROTO=TCP SPT=50065 DPT=33441 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-08 16:10:27
185.250.205.84 attackbots
firewall-block, port(s): 17430/tcp, 36250/tcp, 43314/tcp, 47088/tcp, 50622/tcp, 57464/tcp, 58599/tcp
2020-06-08 16:00:28
200.8.127.141 attackbots
Telnet Server BruteForce Attack
2020-06-08 15:53:57
80.78.70.91 attack
RDP brute forcing (r)
2020-06-08 16:12:56
36.81.7.66 attackspambots
1591588228 - 06/08/2020 05:50:28 Host: 36.81.7.66/36.81.7.66 Port: 445 TCP Blocked
2020-06-08 15:58:08
106.12.73.128 attackspam
$f2bV_matches
2020-06-08 15:41:23
162.144.128.178 attackbots
Trolling for resource vulnerabilities
2020-06-08 15:49:23
106.13.150.200 attack
20 attempts against mh-ssh on echoip
2020-06-08 15:51:17
69.157.149.194 attackspam
Tried to find non-existing directory/file on the server
2020-06-08 16:07:36
99.11.1.97 attackbots
Jun  8 08:34:46 nas sshd[16571]: Failed password for root from 99.11.1.97 port 53772 ssh2
Jun  8 08:45:16 nas sshd[17008]: Failed password for root from 99.11.1.97 port 43920 ssh2
...
2020-06-08 16:19:29
85.128.142.248 attackspam
"demo/wp-includes/wlwmanifest.xml"_
2020-06-08 15:52:20
171.244.16.85 attackbots
"en/wp-includes/wlwmanifest.xml"_
2020-06-08 16:02:51
122.51.2.33 attackspam
Jun  8 10:03:02 lnxded63 sshd[15969]: Failed password for root from 122.51.2.33 port 35684 ssh2
Jun  8 10:07:58 lnxded63 sshd[16312]: Failed password for root from 122.51.2.33 port 58048 ssh2
2020-06-08 16:13:37
187.34.241.226 attackbots
Jun  8 11:21:47 webhost01 sshd[24590]: Failed password for root from 187.34.241.226 port 44913 ssh2
...
2020-06-08 15:53:21

Recently Reported IPs

142.116.65.89 176.159.3.149 130.2.249.65 138.82.156.76
167.220.158.159 30.156.232.99 156.6.148.10 79.219.154.69
133.157.175.187 244.100.244.80 101.240.147.40 94.116.59.134
28.100.58.177 121.48.223.220 69.201.71.203 140.164.220.105
12.128.132.178 235.141.17.185 9.123.7.118 116.173.122.4