Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Beijing Guanghuan Xinwang Digital Technology Co.Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Jan 25 08:03:23 MainVPS sshd[8428]: Invalid user arif from 52.80.29.39 port 54362
Jan 25 08:03:23 MainVPS sshd[8428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.80.29.39
Jan 25 08:03:23 MainVPS sshd[8428]: Invalid user arif from 52.80.29.39 port 54362
Jan 25 08:03:25 MainVPS sshd[8428]: Failed password for invalid user arif from 52.80.29.39 port 54362 ssh2
Jan 25 08:13:12 MainVPS sshd[26717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.80.29.39  user=root
Jan 25 08:13:14 MainVPS sshd[26717]: Failed password for root from 52.80.29.39 port 54176 ssh2
...
2020-01-25 16:07:29
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.80.29.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.80.29.39.			IN	A

;; AUTHORITY SECTION:
.			269	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012500 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 16:07:27 CST 2020
;; MSG SIZE  rcvd: 115
Host info
39.29.80.52.in-addr.arpa domain name pointer ec2-52-80-29-39.cn-north-1.compute.amazonaws.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.29.80.52.in-addr.arpa	name = ec2-52-80-29-39.cn-north-1.compute.amazonaws.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.142.125.214 proxy
VPN fraud
2023-03-31 12:54:37
66.254.114.38 attack
Scan
2023-04-05 12:57:02
183.136.225.9 proxy
VPN fraud
2023-03-27 12:46:44
92.63.196.138 attack
Scan port
2023-04-04 12:50:00
204.15.78.236 attack
Scan port
2023-04-03 13:01:30
65.49.20.124 proxy
VPN fraud
2023-04-03 13:08:01
104.152.52.110 attack
Scan port
2023-04-05 12:53:49
163.47.158.122 attack
Hack my facebook account
2023-03-23 04:27:44
107.172.226.177 spam
Attempted/ unsuccessful login to email account
2023-03-22 02:01:16
103.166.10.163 spambotsattackproxynormal
Application
2023-03-24 07:56:24
192.241.200.48 proxy
VPN fraud
2023-04-06 13:12:49
192.241.224.9 proxy
VPN fraud
2023-03-24 13:55:14
45.93.16.216 attack
Scan port DDoS
2023-03-23 15:04:28
104.129.63.114 proxy
VPN fraud
2023-03-24 13:59:17
167.94.138.152 proxy
Scanner VPN
2023-03-21 13:50:31

Recently Reported IPs

75.202.30.45 37.0.162.145 99.146.189.134 92.25.130.214
45.225.195.33 151.199.84.128 166.206.187.212 220.235.100.43
80.230.36.232 86.16.142.253 88.35.164.82 42.151.80.97
161.103.201.172 170.88.223.109 78.9.28.241 24.115.16.222
165.171.65.30 244.197.150.212 40.87.51.150 43.227.58.145