Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.89.83.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.89.83.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011801 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 11:33:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
222.83.89.52.in-addr.arpa domain name pointer ec2-52-89-83-222.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.83.89.52.in-addr.arpa	name = ec2-52-89-83-222.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.90.38.100 attack
Apr 26 05:40:35 xeon sshd[7085]: Failed password for invalid user madura from 211.90.38.100 port 46996 ssh2
2020-04-26 17:28:00
94.102.50.144 attackbotsspam
Scanning for open ports and vulnerable services: 34801,34805,34822,34840,34844,34846,34857,34898
2020-04-26 17:24:53
60.13.194.71 attackspam
firewall-block, port(s): 1433/tcp
2020-04-26 17:27:35
119.97.164.243 attack
$f2bV_matches
2020-04-26 17:17:40
116.105.215.232 attackspambots
2020-04-26T10:47:09.208533v220200467592115444 sshd[2498]: User root from 116.105.215.232 not allowed because not listed in AllowUsers
2020-04-26T10:47:09.526324v220200467592115444 sshd[2498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.105.215.232  user=root
2020-04-26T10:47:09.208533v220200467592115444 sshd[2498]: User root from 116.105.215.232 not allowed because not listed in AllowUsers
2020-04-26T10:47:11.912731v220200467592115444 sshd[2498]: Failed password for invalid user root from 116.105.215.232 port 50382 ssh2
2020-04-26T10:47:46.500155v220200467592115444 sshd[2504]: Invalid user admin from 116.105.215.232 port 39320
...
2020-04-26 16:57:47
185.40.4.116 attack
firewall-block, port(s): 82/tcp, 89/tcp, 97/tcp, 500/tcp
2020-04-26 17:07:20
94.102.56.181 attackspam
firewall-block, port(s): 9549/tcp, 22222/tcp, 33333/tcp
2020-04-26 17:23:55
190.117.166.83 attackbotsspam
$f2bV_matches
2020-04-26 16:51:18
106.54.82.34 attackbotsspam
2020-04-26T08:50:13.691623shield sshd\[9566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.82.34  user=root
2020-04-26T08:50:15.667069shield sshd\[9566\]: Failed password for root from 106.54.82.34 port 47948 ssh2
2020-04-26T08:52:44.506408shield sshd\[9756\]: Invalid user nas from 106.54.82.34 port 46868
2020-04-26T08:52:44.510455shield sshd\[9756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.82.34
2020-04-26T08:52:46.550865shield sshd\[9756\]: Failed password for invalid user nas from 106.54.82.34 port 46868 ssh2
2020-04-26 17:24:28
198.108.66.230 attackbots
Apr 26 10:32:40 debian-2gb-nbg1-2 kernel: \[10148896.750134\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.66.230 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=43927 PROTO=TCP SPT=55962 DPT=636 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-26 17:04:14
111.231.54.28 attackspam
Apr  3 12:31:13 ms-srv sshd[8974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.28
Apr  3 12:31:15 ms-srv sshd[8974]: Failed password for invalid user kuangtu from 111.231.54.28 port 40806 ssh2
2020-04-26 16:55:10
222.186.180.147 attack
Apr 26 11:17:11 santamaria sshd\[27588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Apr 26 11:17:12 santamaria sshd\[27588\]: Failed password for root from 222.186.180.147 port 10542 ssh2
Apr 26 11:17:32 santamaria sshd\[27592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
...
2020-04-26 17:21:45
59.49.13.45 attackspambots
Apr 26 09:01:13 OPSO sshd\[32156\]: Invalid user atlas from 59.49.13.45 port 50861
Apr 26 09:01:13 OPSO sshd\[32156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.49.13.45
Apr 26 09:01:15 OPSO sshd\[32156\]: Failed password for invalid user atlas from 59.49.13.45 port 50861 ssh2
Apr 26 09:06:02 OPSO sshd\[1055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.49.13.45  user=root
Apr 26 09:06:04 OPSO sshd\[1055\]: Failed password for root from 59.49.13.45 port 22715 ssh2
2020-04-26 17:25:20
192.99.34.42 attack
LGS,WP GET /wp-login.php
2020-04-26 17:01:44
122.144.131.141 attackbotsspam
[MK-Root1] Blocked by UFW
2020-04-26 17:36:31

Recently Reported IPs

58.128.194.57 137.65.203.73 187.106.77.146 124.15.228.108
222.47.59.249 114.125.249.200 114.125.249.20 240.249.145.24
12.82.144.148 39.168.53.62 120.63.196.132 59.167.70.217
172.203.225.231 164.196.222.37 73.83.165.105 135.77.124.103
180.247.6.51 115.188.7.224 128.235.5.23 247.29.69.198