Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.80.93.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.80.93.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031000 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 16:15:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
159.93.80.52.in-addr.arpa domain name pointer ec2-52-80-93-159.cn-north-1.compute.amazonaws.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.93.80.52.in-addr.arpa	name = ec2-52-80-93-159.cn-north-1.compute.amazonaws.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.27.140.178 attackspam
RDP brute force attack detected by fail2ban
2019-10-06 04:42:02
37.59.103.173 attackbotsspam
frenzy
2019-10-06 04:16:57
134.209.108.106 attack
Oct  5 10:01:33 web9 sshd\[11967\]: Invalid user brandsma from 134.209.108.106
Oct  5 10:01:33 web9 sshd\[11967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106
Oct  5 10:01:34 web9 sshd\[11967\]: Failed password for invalid user brandsma from 134.209.108.106 port 38992 ssh2
Oct  5 10:01:55 web9 sshd\[12040\]: Invalid user gary from 134.209.108.106
Oct  5 10:01:55 web9 sshd\[12040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106
2019-10-06 04:07:22
81.22.45.104 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-06 04:20:54
185.176.27.246 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-06 04:45:49
51.83.73.160 attackbotsspam
Oct  5 16:07:15 TORMINT sshd\[9153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.160  user=root
Oct  5 16:07:17 TORMINT sshd\[9153\]: Failed password for root from 51.83.73.160 port 42422 ssh2
Oct  5 16:10:58 TORMINT sshd\[9431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.160  user=root
...
2019-10-06 04:12:17
201.228.121.230 attackbotsspam
Oct  5 23:21:46 server sshd\[27069\]: Invalid user 123Blade from 201.228.121.230 port 53440
Oct  5 23:21:46 server sshd\[27069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.228.121.230
Oct  5 23:21:48 server sshd\[27069\]: Failed password for invalid user 123Blade from 201.228.121.230 port 53440 ssh2
Oct  5 23:27:37 server sshd\[8112\]: Invalid user Porn123 from 201.228.121.230 port 37160
Oct  5 23:27:37 server sshd\[8112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.228.121.230
2019-10-06 04:40:44
190.8.168.252 attack
xmlrpc attack
2019-10-06 04:18:16
185.234.219.56 spamattack
Well-known host name of ylmf-pc; combination of SPAM and DOS, by flooding
2019-10-06 04:37:54
212.158.166.108 attackbotsspam
RDP Scan
2019-10-06 04:22:28
132.148.142.61 attackspam
[munged]::443 132.148.142.61 - - [05/Oct/2019:21:40:59 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 132.148.142.61 - - [05/Oct/2019:21:41:01 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 132.148.142.61 - - [05/Oct/2019:21:41:04 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 132.148.142.61 - - [05/Oct/2019:21:41:06 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 132.148.142.61 - - [05/Oct/2019:21:41:08 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 132.148.142.61 - - [05/Oct/2019:21:41:10 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11
2019-10-06 04:21:20
189.26.193.235 attackspam
SSH Brute-Forcing (ownc)
2019-10-06 04:36:54
222.186.175.147 attack
Oct  5 16:33:12 TORMINT sshd\[11018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Oct  5 16:33:14 TORMINT sshd\[11018\]: Failed password for root from 222.186.175.147 port 50930 ssh2
Oct  5 16:33:19 TORMINT sshd\[11018\]: Failed password for root from 222.186.175.147 port 50930 ssh2
...
2019-10-06 04:35:26
222.186.180.19 attack
Oct  5 22:41:22 dedicated sshd[18635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.19  user=root
Oct  5 22:41:24 dedicated sshd[18635]: Failed password for root from 222.186.180.19 port 25332 ssh2
2019-10-06 04:48:13
200.150.74.114 attackspambots
Oct  5 21:36:45 vmanager6029 sshd\[30803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114  user=root
Oct  5 21:36:47 vmanager6029 sshd\[30803\]: Failed password for root from 200.150.74.114 port 12286 ssh2
Oct  5 21:41:02 vmanager6029 sshd\[30938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114  user=root
2019-10-06 04:34:49

Recently Reported IPs

23.218.171.101 52.249.62.88 97.178.222.34 83.205.31.125
54.158.9.245 84.181.107.21 170.185.0.236 6.184.122.131
142.39.28.109 52.194.235.172 166.109.249.194 145.177.157.194
246.139.14.169 81.98.50.126 22.218.5.176 5.5.51.16
218.109.2.236 99.41.202.211 82.81.24.154 248.4.253.156