Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.114.50.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.114.50.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:27:18 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 73.50.114.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.50.114.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.251.174.241 attackspambots
SSH brutforce
2020-02-04 22:16:36
14.171.191.235 attackspambots
2019-04-21 07:36:20 1hI59F-00027Z-DU SMTP connection from \(static.vnpt.vn\) \[14.171.191.235\]:33553 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-21 07:37:54 1hI5Al-00029M-AI SMTP connection from \(static.vnpt.vn\) \[14.171.191.235\]:33938 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-21 07:38:27 1hI5BH-0002A3-IG SMTP connection from \(static.vnpt.vn\) \[14.171.191.235\]:34051 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:56:17
165.90.239.176 attackbots
Automatic report - Port Scan Attack
2020-02-04 22:38:13
14.171.89.115 attackspam
2019-09-16 09:51:29 1i9lnE-0004kc-MD SMTP connection from \(static.vnpt.vn\) \[14.171.89.115\]:26489 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 09:51:32 1i9lnH-0004kf-Q4 SMTP connection from \(static.vnpt.vn\) \[14.171.89.115\]:26511 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 09:51:35 1i9lnK-0004km-Ns SMTP connection from \(static.vnpt.vn\) \[14.171.89.115\]:26520 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:51:36
95.215.68.90 attackbots
Feb  4 15:27:02 ns381471 sshd[11596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.215.68.90
Feb  4 15:27:04 ns381471 sshd[11596]: Failed password for invalid user brunhilda from 95.215.68.90 port 58530 ssh2
2020-02-04 22:52:21
191.81.157.96 attack
Feb  4 14:52:03 MK-Soft-VM4 sshd[12252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.81.157.96 
Feb  4 14:52:05 MK-Soft-VM4 sshd[12252]: Failed password for invalid user guest from 191.81.157.96 port 37394 ssh2
...
2020-02-04 23:00:44
121.23.141.60 attack
Automatic report - Port Scan Attack
2020-02-04 22:46:35
14.169.232.236 attackspambots
2019-06-21 12:10:39 1heGVC-0000wC-KN SMTP connection from \(static.vnpt.vn\) \[14.169.232.236\]:31551 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 12:11:09 1heGVg-0000wv-EP SMTP connection from \(static.vnpt.vn\) \[14.169.232.236\]:31747 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 12:11:30 1heGW1-0000xC-6y SMTP connection from \(static.vnpt.vn\) \[14.169.232.236\]:31890 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:58:52
120.136.167.74 attackspambots
Feb  4 15:38:05 srv-ubuntu-dev3 sshd[27266]: Invalid user postgres from 120.136.167.74
Feb  4 15:38:05 srv-ubuntu-dev3 sshd[27266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.136.167.74
Feb  4 15:38:05 srv-ubuntu-dev3 sshd[27266]: Invalid user postgres from 120.136.167.74
Feb  4 15:38:07 srv-ubuntu-dev3 sshd[27266]: Failed password for invalid user postgres from 120.136.167.74 port 56090 ssh2
Feb  4 15:41:52 srv-ubuntu-dev3 sshd[27800]: Invalid user bash from 120.136.167.74
Feb  4 15:41:53 srv-ubuntu-dev3 sshd[27800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.136.167.74
Feb  4 15:41:52 srv-ubuntu-dev3 sshd[27800]: Invalid user bash from 120.136.167.74
Feb  4 15:41:55 srv-ubuntu-dev3 sshd[27800]: Failed password for invalid user bash from 120.136.167.74 port 40266 ssh2
Feb  4 15:45:51 srv-ubuntu-dev3 sshd[28181]: Invalid user saboorian from 120.136.167.74
...
2020-02-04 23:02:39
14.166.174.72 attackspam
2019-07-07 08:54:51 1hk14U-0000fT-N5 SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11105 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 08:55:20 1hk14x-0000hJ-6r SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11272 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 08:55:41 1hk15H-0000ha-O7 SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11394 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 23:03:04
14.182.68.198 attackbots
2019-03-08 11:54:03 1h2D8d-00072s-6K SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:49945 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 11:54:31 1h2D94-00073V-No SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:10135 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 11:54:45 1h2D9I-00073p-Fl SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:10238 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:33:34
172.69.68.177 attackbots
SQL injection:/newsites/free/pierre/search/searchSVI.php?continentName=EU+-6863+union+all+select+1,1,1,CONCAT(0x3a6f79753a,0x4244764877697569706b,0x3a70687a3a)1,1,1%23&country=276+&prj_typ=all&startdate=&enddate=&from=&page=1&searchSubmission=Recherche
2020-02-04 22:50:47
14.171.254.21 attack
2019-03-14 15:12:38 H=\(static.vnpt.vn\) \[14.171.254.21\]:13125 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-14 15:12:49 H=\(static.vnpt.vn\) \[14.171.254.21\]:13211 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-14 15:12:58 H=\(static.vnpt.vn\) \[14.171.254.21\]:13277 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-04 22:52:55
14.165.13.107 attackbots
2019-03-15 04:34:18 H=\(static.vnpt.vn\) \[14.165.13.107\]:37053 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 04:34:44 H=\(static.vnpt.vn\) \[14.165.13.107\]:37202 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 04:34:58 H=\(static.vnpt.vn\) \[14.165.13.107\]:37287 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-04 23:07:28
96.68.169.189 attackbotsspam
Feb  4 14:46:38 DAAP sshd[19398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.68.169.189  user=root
Feb  4 14:46:39 DAAP sshd[19398]: Failed password for root from 96.68.169.189 port 59395 ssh2
Feb  4 14:52:51 DAAP sshd[19458]: Invalid user fq from 96.68.169.189 port 51212
Feb  4 14:52:51 DAAP sshd[19458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.68.169.189
Feb  4 14:52:51 DAAP sshd[19458]: Invalid user fq from 96.68.169.189 port 51212
Feb  4 14:52:53 DAAP sshd[19458]: Failed password for invalid user fq from 96.68.169.189 port 51212 ssh2
...
2020-02-04 22:23:15

Recently Reported IPs

186.86.53.84 28.50.165.150 144.21.240.159 39.38.188.148
59.229.113.11 87.175.89.106 64.56.145.51 96.179.223.87
29.107.242.69 248.71.208.230 246.77.15.141 33.143.145.73
239.167.12.230 8.137.152.32 244.99.1.28 73.134.77.98
60.54.1.43 29.30.204.82 57.51.78.92 153.56.123.134