Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seattle

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.85.213.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47250
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.85.213.9.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081900 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 20 00:32:34 CST 2019
;; MSG SIZE  rcvd: 115
Host info
9.213.85.52.in-addr.arpa domain name pointer server-52-85-213-9.dfw3.r.cloudfront.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
9.213.85.52.in-addr.arpa	name = server-52-85-213-9.dfw3.r.cloudfront.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.234.219.226 attackspam
2020-07-08T11:15:12.070154linuxbox-skyline auth[737989]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=compaq rhost=185.234.219.226
...
2020-07-09 02:02:34
176.65.116.155 attack
Automatic report - XMLRPC Attack
2020-07-09 02:03:03
201.20.82.73 attackspam
20/7/8@09:22:29: FAIL: Alarm-Network address from=201.20.82.73
20/7/8@09:22:29: FAIL: Alarm-Network address from=201.20.82.73
...
2020-07-09 02:23:15
220.191.185.2 attackbotsspam
1433/tcp
[2020-07-08]1pkt
2020-07-09 02:09:46
162.243.139.215 attackspam
[Sun May 31 07:21:00 2020] - DDoS Attack From IP: 162.243.139.215 Port: 60515
2020-07-09 02:14:16
198.23.148.137 attackbotsspam
Jul  8 13:45:24 nextcloud sshd\[11806\]: Invalid user xiehao from 198.23.148.137
Jul  8 13:45:24 nextcloud sshd\[11806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.148.137
Jul  8 13:45:25 nextcloud sshd\[11806\]: Failed password for invalid user xiehao from 198.23.148.137 port 39348 ssh2
2020-07-09 02:17:34
197.44.227.86 attackspambots
Unauthorized connection attempt from IP address 197.44.227.86 on Port 445(SMB)
2020-07-09 02:17:56
79.188.68.89 attackbots
IP blocked
2020-07-09 01:58:53
139.155.38.67 attack
Jul  8 18:53:02 gw1 sshd[20381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.38.67
Jul  8 18:53:04 gw1 sshd[20381]: Failed password for invalid user jking from 139.155.38.67 port 53112 ssh2
...
2020-07-09 02:12:15
73.63.207.93 attackspam
22/tcp 22/tcp
[2020-07-08]2pkt
2020-07-09 02:06:11
188.37.7.90 attack
Unauthorized connection attempt detected from IP address 188.37.7.90 to port 2323
2020-07-09 02:35:23
49.146.40.129 attackspambots
445/tcp
[2020-07-08]1pkt
2020-07-09 02:36:12
156.199.141.57 attackbotsspam
60001/tcp
[2020-07-08]1pkt
2020-07-09 02:23:57
186.95.227.222 attack
DATE:2020-07-08 13:45:13, IP:186.95.227.222, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-07-09 02:28:16
49.51.160.77 attackbotsspam
Unauthorized connection attempt detected from IP address 49.51.160.77 to port 9595
2020-07-09 02:11:32

Recently Reported IPs

82.182.169.124 115.79.51.102 40.117.198.178 101.4.219.41
194.40.98.211 212.163.209.240 223.184.54.250 170.216.7.54
210.142.216.223 147.171.40.67 147.97.76.120 150.121.213.168
183.88.241.25 97.41.244.39 39.218.130.15 124.145.7.211
136.154.198.245 67.147.243.237 58.92.138.214 204.217.93.125