Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.90.149.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.90.149.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025082000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 20 15:30:41 CST 2025
;; MSG SIZE  rcvd: 104
Host info
1.149.90.52.in-addr.arpa domain name pointer ec2-52-90-149-1.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.149.90.52.in-addr.arpa	name = ec2-52-90-149-1.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.52.215.79 attackspam
Unauthorized connection attempt detected from IP address 110.52.215.79 to port 2220 [J]
2020-01-13 05:19:06
37.114.172.28 attackspam
Jan 12 22:29:11 vmanager6029 sshd\[5192\]: Invalid user admin from 37.114.172.28 port 47478
Jan 12 22:29:11 vmanager6029 sshd\[5192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.172.28
Jan 12 22:29:13 vmanager6029 sshd\[5192\]: Failed password for invalid user admin from 37.114.172.28 port 47478 ssh2
2020-01-13 05:44:33
119.28.152.128 attack
Unauthorized connection attempt detected from IP address 119.28.152.128 to port 5803 [J]
2020-01-13 05:17:29
185.176.27.2 attackbotsspam
01/12/2020-22:29:21.571377 185.176.27.2 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-13 05:40:19
73.183.193.37 attackspambots
Unauthorized connection attempt detected from IP address 73.183.193.37 to port 23
2020-01-13 05:26:02
125.162.254.24 attackbots
1578864571 - 01/12/2020 22:29:31 Host: 125.162.254.24/125.162.254.24 Port: 445 TCP Blocked
2020-01-13 05:35:22
81.170.214.154 attack
Unauthorized connection attempt detected from IP address 81.170.214.154 to port 2220 [J]
2020-01-13 05:47:11
139.199.82.103 attackspambots
Unauthorized connection attempt detected from IP address 139.199.82.103 to port 2220 [J]
2020-01-13 05:15:28
149.140.31.220 attackspambots
Unauthorized connection attempt detected from IP address 149.140.31.220 to port 8080
2020-01-13 05:14:49
177.106.94.147 attackspambots
Unauthorized connection attempt detected from IP address 177.106.94.147 to port 88 [J]
2020-01-13 05:11:17
182.254.172.219 attackspambots
Jan 12 20:54:29 vps58358 sshd\[27101\]: Invalid user puppet from 182.254.172.219Jan 12 20:54:31 vps58358 sshd\[27101\]: Failed password for invalid user puppet from 182.254.172.219 port 53674 ssh2Jan 12 20:58:02 vps58358 sshd\[27132\]: Invalid user chiudi from 182.254.172.219Jan 12 20:58:04 vps58358 sshd\[27132\]: Failed password for invalid user chiudi from 182.254.172.219 port 47932 ssh2Jan 12 21:01:29 vps58358 sshd\[27163\]: Invalid user people from 182.254.172.219Jan 12 21:01:31 vps58358 sshd\[27163\]: Failed password for invalid user people from 182.254.172.219 port 35104 ssh2
...
2020-01-13 05:11:00
177.42.110.1 attackspambots
Honeypot attack, port: 81, PTR: gvt-b-se04.cta.gvt.net.br.
2020-01-13 05:12:03
83.242.254.226 attackspam
Unauthorized connection attempt detected from IP address 83.242.254.226 to port 81 [J]
2020-01-13 05:23:53
129.226.160.122 attackspam
Jan 12 22:23:26 meumeu sshd[24665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.160.122 
Jan 12 22:23:29 meumeu sshd[24665]: Failed password for invalid user bus from 129.226.160.122 port 58586 ssh2
Jan 12 22:29:34 meumeu sshd[25738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.160.122 
...
2020-01-13 05:33:14
122.117.171.29 attackbots
Unauthorized connection attempt detected from IP address 122.117.171.29 to port 81 [J]
2020-01-13 05:17:12

Recently Reported IPs

81.0.252.19 215.62.173.112 154.3.33.148 78.46.57.111
183.162.110.9 102.212.4.41 18.212.27.177 151.243.22.36
162.159.209.251 29.59.178.90 166.88.100.144 73.213.28.12
133.220.115.198 114.221.20.191 192.168.01.01 46.101.205.240
46.101.119.223 142.93.173.39 68.183.219.27 209.97.175.8