Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.85.252.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.85.252.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031401 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 11:57:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
166.252.85.52.in-addr.arpa domain name pointer server-52-85-252-166.jnb50.r.cloudfront.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.252.85.52.in-addr.arpa	name = server-52-85-252-166.jnb50.r.cloudfront.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
207.248.112.7 attack
$f2bV_matches
2020-07-05 20:08:58
103.41.107.198 attack
Jul  5 10:56:26 ns3033917 sshd[20990]: Invalid user webdev from 103.41.107.198 port 57390
Jul  5 10:56:28 ns3033917 sshd[20990]: Failed password for invalid user webdev from 103.41.107.198 port 57390 ssh2
Jul  5 11:03:50 ns3033917 sshd[21067]: Invalid user henry from 103.41.107.198 port 39236
...
2020-07-05 19:51:35
190.246.155.29 attackspambots
Jul  5 sshd[24123]: Invalid user fred from 190.246.155.29 port 42552
2020-07-05 19:58:58
46.101.95.65 attackbotsspam
46.101.95.65 - - [05/Jul/2020:13:20:49 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.95.65 - - [05/Jul/2020:13:20:50 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.95.65 - - [05/Jul/2020:13:20:51 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-05 20:03:59
49.51.161.77 attackbots
Unauthorized connection attempt detected from IP address 49.51.161.77 to port 2053
2020-07-05 20:14:24
61.0.247.115 attackbots
1433/tcp 445/tcp...
[2020-05-06/07-04]26pkt,2pt.(tcp)
2020-07-05 20:20:38
119.2.17.138 attackbots
$f2bV_matches
2020-07-05 19:59:42
37.59.37.69 attackspam
Jul  5 14:25:06 ns381471 sshd[16646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69
Jul  5 14:25:08 ns381471 sshd[16646]: Failed password for invalid user felix from 37.59.37.69 port 47650 ssh2
2020-07-05 20:25:52
61.95.233.61 attackspam
Invalid user fx from 61.95.233.61 port 46558
2020-07-05 19:48:22
51.178.78.154 attackspambots
 TCP (SYN) 51.178.78.154:39894 -> port 6006, len 44
2020-07-05 19:53:05
73.120.12.108 attackbots
Brute force 52 attempts
2020-07-05 19:49:05
212.129.246.52 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-05T06:44:41Z and 2020-07-05T06:49:41Z
2020-07-05 20:14:48
185.175.93.104 attackbots
07/05/2020-07:00:40.103323 185.175.93.104 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-05 19:47:38
104.131.231.109 attack
Jul  5 13:17:06 ovpn sshd\[12717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.231.109  user=root
Jul  5 13:17:08 ovpn sshd\[12717\]: Failed password for root from 104.131.231.109 port 47884 ssh2
Jul  5 13:30:29 ovpn sshd\[15931\]: Invalid user elasticsearch from 104.131.231.109
Jul  5 13:30:29 ovpn sshd\[15931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.231.109
Jul  5 13:30:31 ovpn sshd\[15931\]: Failed password for invalid user elasticsearch from 104.131.231.109 port 35606 ssh2
2020-07-05 20:18:44
45.151.248.11 attackspambots
Automatic report - XMLRPC Attack
2020-07-05 19:58:10

Recently Reported IPs

33.150.37.121 212.142.17.212 75.80.11.36 118.93.31.97
48.144.202.150 151.180.130.124 110.33.225.14 182.152.95.88
191.177.156.22 65.1.87.243 42.202.189.33 79.157.131.47
44.210.86.14 251.241.178.131 18.186.142.221 93.115.86.31
128.190.156.176 130.88.53.167 239.57.128.148 194.186.126.61