Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.68.34.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.68.34.49.			IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 20:21:02 CST 2022
;; MSG SIZE  rcvd: 104
Host info
49.34.68.52.in-addr.arpa domain name pointer ec2-52-68-34-49.ap-northeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.34.68.52.in-addr.arpa	name = ec2-52-68-34-49.ap-northeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.238.86.24 attackbotsspam
UTC: 2019-11-26 port: 123/udp
2019-11-28 01:59:24
189.52.165.134 attack
Nov 27 14:52:19 flomail postfix/submission/smtpd[31653]: warning: unknown[189.52.165.134]: SASL PLAIN authentication failed: 
Nov 27 14:52:26 flomail postfix/submission/smtpd[31653]: warning: unknown[189.52.165.134]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 27 14:52:40 flomail postfix/submission/smtpd[31653]: warning: unknown[189.52.165.134]: SASL PLAIN authentication failed:
2019-11-28 01:20:48
49.88.112.116 attackbotsspam
Nov 27 18:29:03 localhost sshd\[11620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Nov 27 18:29:06 localhost sshd\[11620\]: Failed password for root from 49.88.112.116 port 10519 ssh2
Nov 27 18:29:07 localhost sshd\[11620\]: Failed password for root from 49.88.112.116 port 10519 ssh2
2019-11-28 01:41:13
160.16.111.215 attackspambots
Nov 27 15:45:29 OPSO sshd\[24628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.111.215  user=root
Nov 27 15:45:31 OPSO sshd\[24628\]: Failed password for root from 160.16.111.215 port 36365 ssh2
Nov 27 15:52:16 OPSO sshd\[25957\]: Invalid user kaphammer from 160.16.111.215 port 54178
Nov 27 15:52:16 OPSO sshd\[25957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.111.215
Nov 27 15:52:17 OPSO sshd\[25957\]: Failed password for invalid user kaphammer from 160.16.111.215 port 54178 ssh2
2019-11-28 01:40:10
196.52.43.112 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 01:51:10
189.125.2.234 attackspam
Nov 27 18:05:54 icinga sshd[20784]: Failed password for root from 189.125.2.234 port 9175 ssh2
...
2019-11-28 01:48:26
202.51.74.189 attackbotsspam
Nov 27 12:35:20 TORMINT sshd\[8863\]: Invalid user jmeter from 202.51.74.189
Nov 27 12:35:20 TORMINT sshd\[8863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Nov 27 12:35:21 TORMINT sshd\[8863\]: Failed password for invalid user jmeter from 202.51.74.189 port 54606 ssh2
...
2019-11-28 01:38:31
180.64.232.253 attackbots
UTC: 2019-11-26 port: 123/udp
2019-11-28 01:37:41
218.92.0.135 attack
Nov 27 18:50:17 nextcloud sshd\[31305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
Nov 27 18:50:19 nextcloud sshd\[31305\]: Failed password for root from 218.92.0.135 port 11039 ssh2
Nov 27 18:50:28 nextcloud sshd\[31305\]: Failed password for root from 218.92.0.135 port 11039 ssh2
...
2019-11-28 01:52:52
106.13.127.238 attack
Nov 27 18:00:11 MK-Soft-VM3 sshd[27054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.238 
Nov 27 18:00:14 MK-Soft-VM3 sshd[27054]: Failed password for invalid user zabedah from 106.13.127.238 port 45811 ssh2
...
2019-11-28 01:51:38
58.101.147.111 attackbots
Excessive Port-Scanning
2019-11-28 01:23:45
175.23.35.153 attackspam
UTC: 2019-11-26 port: 23/tcp
2019-11-28 01:27:38
180.165.1.44 attackbots
Nov 27 11:22:25 mail sshd\[1224\]: Invalid user yutanim from 180.165.1.44
Nov 27 11:22:25 mail sshd\[1224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.165.1.44
...
2019-11-28 01:29:40
159.65.12.204 attackbots
2019-11-27T16:58:48.669516abusebot-3.cloudsearch.cf sshd\[31564\]: Invalid user alstergren from 159.65.12.204 port 59826
2019-11-28 01:47:48
152.136.100.66 attack
Nov 27 15:52:05 jane sshd[4344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.100.66 
Nov 27 15:52:08 jane sshd[4344]: Failed password for invalid user egger from 152.136.100.66 port 33748 ssh2
...
2019-11-28 01:53:11

Recently Reported IPs

94.34.120.109 54.118.197.156 72.138.143.61 168.167.250.17
51.116.187.167 58.123.115.32 1.8.26.100 60.182.3.91
157.245.224.37 52.209.63.28 79.26.145.150 31.153.20.227
89.135.193.193 213.126.122.1 91.127.236.232 5.139.90.242
161.27.65.233 127.181.91.143 33.149.84.38 117.158.122.166