Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shenzhen

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.38.14.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29804
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;59.38.14.53.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 15 01:48:17 CST 2019
;; MSG SIZE  rcvd: 115

Host info
53.14.38.59.in-addr.arpa domain name pointer 53.14.38.59.broad.zh.gd.dynamic.163data.com.cn.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
53.14.38.59.in-addr.arpa	name = 53.14.38.59.broad.zh.gd.dynamic.163data.com.cn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
95.181.218.157 attack
fell into ViewStateTrap:Lusaka01
2020-03-08 03:26:50
201.234.178.151 attack
Unauthorized connection attempt from IP address 201.234.178.151 on Port 445(SMB)
2020-03-08 03:09:04
124.156.98.182 attack
suspicious action Sat, 07 Mar 2020 10:29:59 -0300
2020-03-08 03:23:49
87.117.216.231 attackbotsspam
SpamScore above: 10.0
2020-03-08 03:10:54
67.58.218.205 attackbotsspam
Honeypot attack, port: 5555, PTR: host-67-58-218-205.public.eastlink.ca.
2020-03-08 03:28:41
82.162.58.49 attackspam
Unauthorized connection attempt from IP address 82.162.58.49 on Port 445(SMB)
2020-03-08 03:12:45
142.44.251.207 attack
Mar 07 13:12:53 askasleikir sshd[72633]: Failed password for root from 142.44.251.207 port 58580 ssh2
Mar 07 13:10:44 askasleikir sshd[72546]: Failed password for invalid user unknown from 142.44.251.207 port 43512 ssh2
Mar 07 13:14:20 askasleikir sshd[72694]: Failed password for invalid user carlo from 142.44.251.207 port 42674 ssh2
2020-03-08 03:33:42
192.241.220.251 attackspambots
" "
2020-03-08 02:56:40
58.215.61.68 attackspam
Unauthorised access (Mar  7) SRC=58.215.61.68 LEN=44 TTL=242 ID=10680 TCP DPT=1433 WINDOW=1024 SYN
2020-03-08 02:57:08
128.199.142.148 attackbots
SSH Brute Force
2020-03-08 03:02:36
152.171.151.143 attackbotsspam
Port probing on unauthorized port 81
2020-03-08 03:35:59
195.175.87.54 attackspam
1583587807 - 03/07/2020 14:30:07 Host: 195.175.87.54/195.175.87.54 Port: 445 TCP Blocked
2020-03-08 03:09:24
170.106.81.36 attackbots
firewall-block, port(s): 8388/tcp
2020-03-08 03:02:13
185.36.81.23 attack
$f2bV_matches
2020-03-08 03:26:27
148.70.118.201 attack
Invalid user fabian from 148.70.118.201 port 39778
2020-03-08 03:30:16

Recently Reported IPs

35.103.246.113 95.82.29.140 209.85.214.196 208.81.5.20
1.223.236.234 86.16.173.176 138.204.147.11 40.163.155.200
101.131.212.68 178.131.104.3 188.27.29.9 221.254.88.126
123.16.206.41 177.78.22.180 197.237.62.205 231.177.9.86
83.17.229.49 70.9.16.1 207.26.43.163 203.196.118.251