Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.52.103.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.52.103.73.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100203 1800 900 604800 86400

;; Query time: 680 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 04:55:01 CST 2019
;; MSG SIZE  rcvd: 116
Host info
73.103.52.14.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.103.52.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.63.174.149 attackspam
Nov  5 06:48:58 firewall sshd[21505]: Failed password for invalid user felix from 14.63.174.149 port 52756 ssh2
Nov  5 06:53:07 firewall sshd[21575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149  user=root
Nov  5 06:53:09 firewall sshd[21575]: Failed password for root from 14.63.174.149 port 43287 ssh2
...
2019-11-05 18:32:25
188.131.142.199 attackspam
Nov  5 07:56:36 [host] sshd[624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.142.199  user=root
Nov  5 07:56:38 [host] sshd[624]: Failed password for root from 188.131.142.199 port 53990 ssh2
Nov  5 08:01:56 [host] sshd[690]: Invalid user vm from 188.131.142.199
Nov  5 08:01:56 [host] sshd[690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.142.199
2019-11-05 18:42:03
41.230.110.231 attackbotsspam
Telnet Server BruteForce Attack
2019-11-05 18:16:52
81.22.45.65 attackspam
Nov  5 11:26:27 mc1 kernel: \[4235890.242146\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=61649 PROTO=TCP SPT=43345 DPT=51726 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  5 11:27:52 mc1 kernel: \[4235975.542356\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=21308 PROTO=TCP SPT=43345 DPT=52012 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  5 11:30:27 mc1 kernel: \[4236130.374358\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=18393 PROTO=TCP SPT=43345 DPT=51563 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-05 18:37:45
120.132.7.52 attack
Nov  5 04:16:33 indra sshd[182921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.7.52  user=r.r
Nov  5 04:16:35 indra sshd[182921]: Failed password for r.r from 120.132.7.52 port 47074 ssh2
Nov  5 04:16:35 indra sshd[182921]: Received disconnect from 120.132.7.52: 11: Bye Bye [preauth]
Nov  5 04:24:21 indra sshd[184189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.7.52  user=r.r
Nov  5 04:24:23 indra sshd[184189]: Failed password for r.r from 120.132.7.52 port 43632 ssh2
Nov  5 04:24:23 indra sshd[184189]: Received disconnect from 120.132.7.52: 11: Bye Bye [preauth]
Nov  5 04:29:25 indra sshd[185012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.7.52  user=r.r
Nov  5 04:29:27 indra sshd[185012]: Failed password for r.r from 120.132.7.52 port 53294 ssh2
Nov  5 04:29:28 indra sshd[185012]: Received disconnect from 120.13........
-------------------------------
2019-11-05 18:21:58
45.55.88.94 attack
Nov  5 10:54:34 XXX sshd[64378]: Invalid user oh from 45.55.88.94 port 35857
2019-11-05 18:12:21
222.186.180.147 attackspambots
Nov  5 11:24:37 srv206 sshd[7695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Nov  5 11:24:39 srv206 sshd[7695]: Failed password for root from 222.186.180.147 port 21954 ssh2
...
2019-11-05 18:25:02
51.75.202.120 attackspambots
IP blocked
2019-11-05 18:14:27
200.129.207.164 attack
Nov  5 04:32:37 giraffe sshd[12049]: Invalid user user from 200.129.207.164
Nov  5 04:32:37 giraffe sshd[12049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.129.207.164
Nov  5 04:32:40 giraffe sshd[12049]: Failed password for invalid user user from 200.129.207.164 port 51654 ssh2
Nov  5 04:32:40 giraffe sshd[12049]: Received disconnect from 200.129.207.164 port 51654:11: Bye Bye [preauth]
Nov  5 04:32:40 giraffe sshd[12049]: Disconnected from 200.129.207.164 port 51654 [preauth]
Nov  5 04:37:30 giraffe sshd[12182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.129.207.164  user=r.r
Nov  5 04:37:32 giraffe sshd[12182]: Failed password for r.r from 200.129.207.164 port 35546 ssh2
Nov  5 04:37:32 giraffe sshd[12182]: Received disconnect from 200.129.207.164 port 35546:11: Bye Bye [preauth]
Nov  5 04:37:32 giraffe sshd[12182]: Disconnected from 200.129.207.164 port 35546 [preauth]
........
-------------------------------
2019-11-05 18:05:53
103.4.210.146 attackbotsspam
[05/Nov/2019:07:25:08 +0100] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-11-05 18:30:38
157.230.235.233 attackbots
$f2bV_matches
2019-11-05 18:17:21
113.172.105.159 attackspambots
ssh failed login
2019-11-05 18:09:09
192.144.231.116 attackspambots
Lines containing failures of 192.144.231.116
Nov  4 09:18:35 mailserver sshd[2115]: Invalid user bw from 192.144.231.116 port 36488
Nov  4 09:18:35 mailserver sshd[2115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.231.116
Nov  4 09:18:37 mailserver sshd[2115]: Failed password for invalid user bw from 192.144.231.116 port 36488 ssh2
Nov  4 09:18:37 mailserver sshd[2115]: Received disconnect from 192.144.231.116 port 36488:11: Bye Bye [preauth]
Nov  4 09:18:37 mailserver sshd[2115]: Disconnected from invalid user bw 192.144.231.116 port 36488 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.144.231.116
2019-11-05 18:40:51
175.166.100.4 attackspam
Fail2Ban Ban Triggered
2019-11-05 18:06:06
156.236.70.215 attack
Nov  4 16:25:58 jonas sshd[1301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.70.215  user=r.r
Nov  4 16:25:59 jonas sshd[1301]: Failed password for r.r from 156.236.70.215 port 58964 ssh2
Nov  4 16:26:00 jonas sshd[1301]: Received disconnect from 156.236.70.215 port 58964:11: Bye Bye [preauth]
Nov  4 16:26:00 jonas sshd[1301]: Disconnected from 156.236.70.215 port 58964 [preauth]
Nov  4 16:36:01 jonas sshd[1893]: Invalid user tez from 156.236.70.215
Nov  4 16:36:01 jonas sshd[1893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.70.215
Nov  4 16:36:03 jonas sshd[1893]: Failed password for invalid user tez from 156.236.70.215 port 44590 ssh2
Nov  4 16:36:04 jonas sshd[1893]: Received disconnect from 156.236.70.215 port 44590:11: Bye Bye [preauth]
Nov  4 16:36:04 jonas sshd[1893]: Disconnected from 156.236.70.215 port 44590 [preauth]
Nov  4 16:40:14 jonas sshd[2463]: pam_........
-------------------------------
2019-11-05 18:28:04

Recently Reported IPs

41.75.4.103 4.143.181.100 176.9.221.118 83.165.123.108
147.79.71.169 122.61.107.232 109.144.39.8 51.182.104.230
199.126.98.33 66.166.215.161 158.44.240.163 19.136.81.48
129.117.144.8 48.137.114.199 42.69.215.234 99.109.191.56
128.29.228.188 19.117.66.25 96.81.43.227 203.121.181.244