Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.83.149.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39392
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.83.149.73.			IN	A

;; AUTHORITY SECTION:
.			955	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080300 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 04 01:22:26 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 73.149.83.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 73.149.83.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.140.188.30 attackbotsspam
23/tcp 161/udp 5900/tcp...
[2020-04-19/06-19]40pkt,15pt.(tcp),1pt.(udp)
2020-06-20 05:52:41
184.105.247.195 attackbotsspam
Unauthorized connection attempt detected from IP address 184.105.247.195 to port 7547
2020-06-20 05:36:37
180.250.247.45 attackbotsspam
2020-06-19T21:23:51.100598shield sshd\[18161\]: Invalid user sid from 180.250.247.45 port 34866
2020-06-19T21:23:51.104569shield sshd\[18161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
2020-06-19T21:23:53.345531shield sshd\[18161\]: Failed password for invalid user sid from 180.250.247.45 port 34866 ssh2
2020-06-19T21:27:49.495458shield sshd\[18635\]: Invalid user postgres from 180.250.247.45 port 33708
2020-06-19T21:27:49.499408shield sshd\[18635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
2020-06-20 05:33:53
112.85.42.172 attackbotsspam
$f2bV_matches
2020-06-20 05:56:08
74.82.47.28 attack
23/tcp 27017/tcp 3389/tcp...
[2020-04-20/06-19]37pkt,14pt.(tcp),1pt.(udp)
2020-06-20 05:27:13
51.255.35.41 attack
SSH Invalid Login
2020-06-20 06:04:20
66.96.228.119 attackbotsspam
SSH Brute-Forcing (server2)
2020-06-20 05:35:45
184.105.139.72 attackspam
SMB Server BruteForce Attack
2020-06-20 05:49:15
189.134.8.37 attackbots
Jun 19 22:27:55 server sshd[11954]: Failed password for invalid user test from 189.134.8.37 port 44132 ssh2
Jun 19 22:35:30 server sshd[20371]: Failed password for invalid user test from 189.134.8.37 port 55546 ssh2
Jun 19 22:39:16 server sshd[24467]: Failed password for invalid user test from 189.134.8.37 port 47044 ssh2
2020-06-20 05:33:28
194.26.29.9 attackbotsspam
Port scan on 12 port(s): 9114 9204 9320 9659 9692 9702 9816 10125 10213 10246 10371 10473
2020-06-20 05:30:26
45.65.129.3 attackbots
Failed password for invalid user idea from 45.65.129.3 port 39664 ssh2
2020-06-20 05:32:57
222.186.173.238 attack
Automatic report BANNED IP
2020-06-20 05:59:42
129.204.177.177 attackspam
Invalid user ted from 129.204.177.177 port 57330
2020-06-20 05:34:41
37.49.227.202 attackspam
Unauthorized connection attempt detected from IP address 37.49.227.202 to port 81
2020-06-20 05:44:55
110.189.108.29 attackspambots
Port scan on 2 port(s): 22 1433
2020-06-20 05:32:45

Recently Reported IPs

144.164.209.162 104.63.137.77 66.169.243.17 3.58.32.81
103.51.145.246 161.11.112.243 195.78.243.130 196.230.101.236
115.213.205.4 75.116.20.185 60.152.241.76 32.155.43.171
74.230.198.189 132.78.150.9 220.162.239.237 44.25.90.127
107.94.86.158 147.135.153.18 130.66.50.140 49.30.200.65