Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: OVH SAS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
51.75.53.141 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-10-10 22:09:57
51.75.53.141 attackspam
51.75.53.141 - - [10/Oct/2020:07:15:11 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [10/Oct/2020:07:15:13 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [10/Oct/2020:07:15:13 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-10 14:03:25
51.75.53.141 attackbots
Automatic report - Banned IP Access
2020-10-05 02:47:00
51.75.53.141 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-10-04 18:30:08
51.75.53.141 attackbots
51.75.53.141 - - [03/Sep/2020:20:38:09 +0100] "POST /wp-login.php HTTP/1.1" 200 1792 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [03/Sep/2020:20:38:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1768 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [03/Sep/2020:20:38:10 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-04 03:54:47
51.75.53.141 attack
51.75.53.141 - - [25/Aug/2020:05:53:09 +0200] "POST /wp-login.php HTTP/1.0" 200 4748 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-25 16:50:15
51.75.53.141 attack
51.75.53.141 - - [21/Aug/2020:21:25:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [21/Aug/2020:21:25:05 +0100] "POST /wp-login.php HTTP/1.1" 200 1929 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [21/Aug/2020:21:25:05 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-22 05:13:53
51.75.53.141 attackbotsspam
51.75.53.141 - - [12/Aug/2020:06:05:57 +0100] "POST /wp-login.php HTTP/1.1" 200 2216 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [12/Aug/2020:06:05:58 +0100] "POST /wp-login.php HTTP/1.1" 200 2229 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [12/Aug/2020:06:05:59 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-12 13:53:57
51.75.53.115 attackbots
$f2bV_matches
2019-11-20 18:47:17
51.75.53.115 attackspam
Nov 20 06:00:30 SilenceServices sshd[13805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.53.115
Nov 20 06:00:31 SilenceServices sshd[13805]: Failed password for invalid user rebe from 51.75.53.115 port 54478 ssh2
Nov 20 06:04:13 SilenceServices sshd[14854]: Failed password for root from 51.75.53.115 port 34746 ssh2
2019-11-20 13:05:33
51.75.53.115 attack
5x Failed Password
2019-11-03 21:16:11
51.75.53.115 attackbots
Oct 31 13:23:42 localhost sshd\[54187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.53.115  user=root
Oct 31 13:23:44 localhost sshd\[54187\]: Failed password for root from 51.75.53.115 port 52222 ssh2
Oct 31 13:27:41 localhost sshd\[54296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.53.115  user=root
Oct 31 13:27:43 localhost sshd\[54296\]: Failed password for root from 51.75.53.115 port 35502 ssh2
Oct 31 13:31:46 localhost sshd\[54398\]: Invalid user mika from 51.75.53.115 port 47016
...
2019-11-01 00:26:25
51.75.53.115 attackspam
Oct 30 06:30:18 server sshd\[6776\]: Invalid user ph from 51.75.53.115
Oct 30 06:30:18 server sshd\[6776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3136560.ip-51-75-53.eu 
Oct 30 06:30:20 server sshd\[6776\]: Failed password for invalid user ph from 51.75.53.115 port 58946 ssh2
Oct 30 06:47:00 server sshd\[10574\]: Invalid user iris from 51.75.53.115
Oct 30 06:47:00 server sshd\[10574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3136560.ip-51-75-53.eu 
...
2019-10-30 19:25:53
51.75.53.115 attack
Oct 27 10:40:32 h2177944 sshd\[31590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.53.115  user=root
Oct 27 10:40:34 h2177944 sshd\[31590\]: Failed password for root from 51.75.53.115 port 52170 ssh2
Oct 27 10:44:33 h2177944 sshd\[32228\]: Invalid user wwwrun from 51.75.53.115 port 33862
Oct 27 10:44:33 h2177944 sshd\[32228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.53.115
...
2019-10-27 18:31:28
51.75.53.115 attack
Oct 21 17:50:42 wbs sshd\[23670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3136560.ip-51-75-53.eu  user=root
Oct 21 17:50:44 wbs sshd\[23670\]: Failed password for root from 51.75.53.115 port 36744 ssh2
Oct 21 17:54:32 wbs sshd\[24003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3136560.ip-51-75-53.eu  user=root
Oct 21 17:54:34 wbs sshd\[24003\]: Failed password for root from 51.75.53.115 port 47746 ssh2
Oct 21 17:58:28 wbs sshd\[24324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3136560.ip-51-75-53.eu  user=root
2019-10-22 12:06:18
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.75.53.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64712
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;51.75.53.104.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 08 04:34:56 CST 2019
;; MSG SIZE  rcvd: 116

Host info
104.53.75.51.in-addr.arpa domain name pointer affdns.org.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
104.53.75.51.in-addr.arpa	name = affdns.org.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
115.85.213.217 attackbotsspam
Rude login attack (26 tries in 1d)
2020-02-13 07:54:04
37.49.230.106 attackspambots
trying to access non-authorized port
2020-02-13 07:57:42
4.14.169.237 attack
1581545945 - 02/12/2020 23:19:05 Host: 4.14.169.237/4.14.169.237 Port: 445 TCP Blocked
2020-02-13 07:43:47
222.186.31.135 attack
Feb 13 00:36:13 MK-Soft-VM7 sshd[16613]: Failed password for root from 222.186.31.135 port 22487 ssh2
Feb 13 00:36:15 MK-Soft-VM7 sshd[16613]: Failed password for root from 222.186.31.135 port 22487 ssh2
...
2020-02-13 07:47:35
106.13.102.141 attackbotsspam
Invalid user messagebus from 106.13.102.141 port 49104
2020-02-13 07:44:01
193.32.161.31 attackspam
02/12/2020-18:28:08.354348 193.32.161.31 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-13 07:56:57
176.199.132.109 attackspam
Feb 13 01:18:49 server sshd\[16269\]: Invalid user pi from 176.199.132.109
Feb 13 01:18:49 server sshd\[16269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-176-199-132-109.hsi06.unitymediagroup.de 
Feb 13 01:18:49 server sshd\[16271\]: Invalid user pi from 176.199.132.109
Feb 13 01:18:49 server sshd\[16271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-176-199-132-109.hsi06.unitymediagroup.de 
Feb 13 01:18:51 server sshd\[16269\]: Failed password for invalid user pi from 176.199.132.109 port 48832 ssh2
...
2020-02-13 07:56:30
119.106.242.196 attackspam
trying to access non-authorized port
2020-02-13 08:02:08
62.102.148.68 attack
SSH Brute Force
2020-02-13 07:50:31
145.239.169.177 attack
Invalid user ryu from 145.239.169.177 port 19635
2020-02-13 08:04:29
51.38.49.140 attackbotsspam
$f2bV_matches
2020-02-13 08:00:41
172.126.50.178 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-13 07:49:25
37.59.122.43 attackbots
Feb 11 20:55:44 scivo sshd[2911]: Invalid user jhf from 37.59.122.43
Feb 11 20:55:46 scivo sshd[2911]: Failed password for invalid user jhf from 37.59.122.43 port 41316 ssh2
Feb 11 20:55:46 scivo sshd[2911]: Received disconnect from 37.59.122.43: 11: Bye Bye [preauth]
Feb 11 21:03:53 scivo sshd[3329]: Invalid user hwe from 37.59.122.43
Feb 11 21:03:55 scivo sshd[3329]: Failed password for invalid user hwe from 37.59.122.43 port 36690 ssh2
Feb 11 21:03:55 scivo sshd[3329]: Received disconnect from 37.59.122.43: 11: Bye Bye [preauth]
Feb 11 21:06:10 scivo sshd[3465]: Invalid user jvz from 37.59.122.43
Feb 11 21:06:13 scivo sshd[3465]: Failed password for invalid user jvz from 37.59.122.43 port 59742 ssh2
Feb 11 21:06:13 scivo sshd[3465]: Received disconnect from 37.59.122.43: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.59.122.43
2020-02-13 07:53:25
122.51.205.106 attackbots
Feb 13 01:20:44 lukav-desktop sshd\[31790\]: Invalid user salakoo from 122.51.205.106
Feb 13 01:20:44 lukav-desktop sshd\[31790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.205.106
Feb 13 01:20:46 lukav-desktop sshd\[31790\]: Failed password for invalid user salakoo from 122.51.205.106 port 59968 ssh2
Feb 13 01:23:04 lukav-desktop sshd\[738\]: Invalid user soncee from 122.51.205.106
Feb 13 01:23:04 lukav-desktop sshd\[738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.205.106
2020-02-13 07:57:31
45.125.66.133 attackspambots
Rude login attack (5 tries in 1d)
2020-02-13 07:44:18

Recently Reported IPs

206.107.109.107 45.64.99.145 142.90.130.88 114.23.49.75
78.124.86.55 170.96.255.81 169.234.43.132 157.230.57.112
94.104.249.129 31.74.36.204 47.150.218.180 147.28.233.222
103.33.84.129 89.46.105.117 89.202.235.72 208.169.148.167
216.127.233.34 12.196.70.27 89.163.205.144 37.197.213.12