Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.50.14.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.50.14.208.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 15:25:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 208.14.50.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 208.14.50.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.188.227.69 attackbots
Unauthorized connection attempt from IP address 203.188.227.69 on Port 445(SMB)
2019-10-19 22:21:08
94.245.168.227 attackbots
Unauthorised access (Oct 19) SRC=94.245.168.227 LEN=52 TTL=116 ID=21833 DF TCP DPT=1433 WINDOW=8192 SYN
2019-10-19 22:41:18
222.186.175.155 attackbotsspam
Oct 19 16:25:05 tux-35-217 sshd\[4174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Oct 19 16:25:07 tux-35-217 sshd\[4174\]: Failed password for root from 222.186.175.155 port 9748 ssh2
Oct 19 16:25:12 tux-35-217 sshd\[4174\]: Failed password for root from 222.186.175.155 port 9748 ssh2
Oct 19 16:25:15 tux-35-217 sshd\[4174\]: Failed password for root from 222.186.175.155 port 9748 ssh2
...
2019-10-19 22:25:44
203.125.104.154 attackbots
Unauthorized connection attempt from IP address 203.125.104.154 on Port 445(SMB)
2019-10-19 22:00:28
118.25.41.154 attackbotsspam
Oct 19 16:01:20 [host] sshd[7709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.41.154  user=root
Oct 19 16:01:23 [host] sshd[7709]: Failed password for root from 118.25.41.154 port 43240 ssh2
Oct 19 16:06:58 [host] sshd[7754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.41.154  user=root
2019-10-19 22:35:19
157.245.205.236 attackbotsspam
Oct 19 15:56:00 meumeu sshd[4491]: Failed password for root from 157.245.205.236 port 44134 ssh2
Oct 19 16:00:57 meumeu sshd[5489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.205.236 
Oct 19 16:00:59 meumeu sshd[5489]: Failed password for invalid user kuroiwa from 157.245.205.236 port 56180 ssh2
...
2019-10-19 22:34:46
162.243.59.16 attackbotsspam
2019-10-19T13:41:43.832256abusebot.cloudsearch.cf sshd\[9077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.59.16  user=root
2019-10-19 22:27:00
193.32.160.151 attackbots
Oct 19 15:18:02 relay postfix/smtpd\[8197\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.151\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.146\]\>
Oct 19 15:18:02 relay postfix/smtpd\[8197\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.151\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.146\]\>
Oct 19 15:18:02 relay postfix/smtpd\[8197\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.151\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.146\]\>
Oct 19 15:18:02 relay postfix/smtpd\[8197\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.151\]: 554 5.7.1 \: Relay access denied\; from=\
2019-10-19 22:07:42
190.198.59.72 attackspam
Unauthorized connection attempt from IP address 190.198.59.72 on Port 445(SMB)
2019-10-19 22:14:31
212.156.92.194 attack
Unauthorized connection attempt from IP address 212.156.92.194 on Port 445(SMB)
2019-10-19 22:42:09
50.199.94.84 attack
Oct 19 16:57:23 intra sshd\[41193\]: Invalid user Ljiljana from 50.199.94.84Oct 19 16:57:25 intra sshd\[41193\]: Failed password for invalid user Ljiljana from 50.199.94.84 port 49436 ssh2Oct 19 17:01:42 intra sshd\[41244\]: Invalid user Passwort1234% from 50.199.94.84Oct 19 17:01:44 intra sshd\[41244\]: Failed password for invalid user Passwort1234% from 50.199.94.84 port 34136 ssh2Oct 19 17:05:51 intra sshd\[41272\]: Invalid user multitrode from 50.199.94.84Oct 19 17:05:53 intra sshd\[41272\]: Failed password for invalid user multitrode from 50.199.94.84 port 45936 ssh2
...
2019-10-19 22:06:04
78.36.111.30 attackbots
Unauthorized connection attempt from IP address 78.36.111.30 on Port 445(SMB)
2019-10-19 22:36:07
59.63.149.179 attackbots
Unauthorized connection attempt from IP address 59.63.149.179 on Port 445(SMB)
2019-10-19 22:13:21
51.75.66.11 attackspam
Invalid user aavetsland from 51.75.66.11 port 54090
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11
Failed password for invalid user aavetsland from 51.75.66.11 port 54090 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11  user=root
Failed password for root from 51.75.66.11 port 37292 ssh2
2019-10-19 22:24:23
41.38.254.127 attackbots
Unauthorized connection attempt from IP address 41.38.254.127 on Port 445(SMB)
2019-10-19 22:12:24

Recently Reported IPs

74.113.141.180 203.225.74.36 241.136.216.151 229.118.155.45
16.240.187.16 231.178.86.214 87.22.87.24 227.246.59.192
71.103.71.234 66.79.125.24 191.212.20.101 8.157.191.131
218.90.106.228 31.10.123.245 159.69.185.209 57.16.241.46
28.233.15.113 126.69.6.125 48.225.183.36 82.109.121.25