Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ponte Vedra

Region: Florida

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 73.53.212.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;73.53.212.14.			IN	A

;; AUTHORITY SECTION:
.			234	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060300 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 04 01:14:23 CST 2024
;; MSG SIZE  rcvd: 105
Host info
14.212.53.73.in-addr.arpa domain name pointer c-73-53-212-14.hsd1.fl.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.212.53.73.in-addr.arpa	name = c-73-53-212-14.hsd1.fl.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.52.198.69 attack
SSH Login Bruteforce
2020-05-06 13:24:43
180.76.158.139 attack
May  6 05:41:52 Ubuntu-1404-trusty-64-minimal sshd\[3327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.158.139  user=root
May  6 05:41:53 Ubuntu-1404-trusty-64-minimal sshd\[3327\]: Failed password for root from 180.76.158.139 port 39738 ssh2
May  6 05:55:20 Ubuntu-1404-trusty-64-minimal sshd\[8634\]: Invalid user booking from 180.76.158.139
May  6 05:55:20 Ubuntu-1404-trusty-64-minimal sshd\[8634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.158.139
May  6 05:55:21 Ubuntu-1404-trusty-64-minimal sshd\[8634\]: Failed password for invalid user booking from 180.76.158.139 port 57556 ssh2
2020-05-06 13:52:28
209.17.96.114 attackbots
srv02 Mass scanning activity detected Target: 9000  ..
2020-05-06 13:21:50
164.132.44.25 attackbotsspam
May  6 06:44:35 srv-ubuntu-dev3 sshd[74883]: Invalid user bo from 164.132.44.25
May  6 06:44:35 srv-ubuntu-dev3 sshd[74883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.25
May  6 06:44:35 srv-ubuntu-dev3 sshd[74883]: Invalid user bo from 164.132.44.25
May  6 06:44:37 srv-ubuntu-dev3 sshd[74883]: Failed password for invalid user bo from 164.132.44.25 port 44284 ssh2
May  6 06:48:18 srv-ubuntu-dev3 sshd[75474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.25  user=root
May  6 06:48:19 srv-ubuntu-dev3 sshd[75474]: Failed password for root from 164.132.44.25 port 52088 ssh2
May  6 06:51:53 srv-ubuntu-dev3 sshd[76013]: Invalid user ttt from 164.132.44.25
May  6 06:51:53 srv-ubuntu-dev3 sshd[76013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.25
May  6 06:51:53 srv-ubuntu-dev3 sshd[76013]: Invalid user ttt from 164.132.44.25
May  
...
2020-05-06 13:01:32
192.144.129.196 attackspambots
DATE:2020-05-06 05:56:32, IP:192.144.129.196, PORT:ssh SSH brute force auth (docker-dc)
2020-05-06 13:09:38
45.124.144.116 attackspambots
(sshd) Failed SSH login from 45.124.144.116 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  6 05:38:06 amsweb01 sshd[3215]: Invalid user hk from 45.124.144.116 port 57916
May  6 05:38:08 amsweb01 sshd[3215]: Failed password for invalid user hk from 45.124.144.116 port 57916 ssh2
May  6 05:52:14 amsweb01 sshd[4329]: Invalid user spark from 45.124.144.116 port 36094
May  6 05:52:16 amsweb01 sshd[4329]: Failed password for invalid user spark from 45.124.144.116 port 36094 ssh2
May  6 05:56:32 amsweb01 sshd[4685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.144.116  user=builder
2020-05-06 13:08:05
111.47.18.232 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-06 13:04:05
178.128.81.60 attackspam
May  6 06:07:55 vps58358 sshd\[15612\]: Invalid user newuser from 178.128.81.60May  6 06:07:56 vps58358 sshd\[15612\]: Failed password for invalid user newuser from 178.128.81.60 port 55470 ssh2May  6 06:10:42 vps58358 sshd\[15698\]: Invalid user lhm from 178.128.81.60May  6 06:10:44 vps58358 sshd\[15698\]: Failed password for invalid user lhm from 178.128.81.60 port 41076 ssh2May  6 06:13:40 vps58358 sshd\[15726\]: Invalid user apptest from 178.128.81.60May  6 06:13:41 vps58358 sshd\[15726\]: Failed password for invalid user apptest from 178.128.81.60 port 55058 ssh2
...
2020-05-06 13:42:54
192.241.135.34 attackspam
SSH Brute-Force Attack
2020-05-06 13:24:23
179.124.36.196 attackbotsspam
SSH Brute-Force Attack
2020-05-06 12:58:36
222.244.144.163 attackbotsspam
May  6 01:23:25 NPSTNNYC01T sshd[20337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.244.144.163
May  6 01:23:26 NPSTNNYC01T sshd[20337]: Failed password for invalid user lf from 222.244.144.163 port 43640 ssh2
May  6 01:28:08 NPSTNNYC01T sshd[20572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.244.144.163
...
2020-05-06 13:47:19
106.12.89.206 attackspambots
May  6 05:48:11 ns382633 sshd\[19307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.206  user=root
May  6 05:48:13 ns382633 sshd\[19307\]: Failed password for root from 106.12.89.206 port 53784 ssh2
May  6 06:00:17 ns382633 sshd\[21624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.206  user=root
May  6 06:00:19 ns382633 sshd\[21624\]: Failed password for root from 106.12.89.206 port 58240 ssh2
May  6 06:04:22 ns382633 sshd\[22097\]: Invalid user viet from 106.12.89.206 port 58292
May  6 06:04:22 ns382633 sshd\[22097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.206
2020-05-06 13:01:57
167.99.131.243 attackbots
May  6 07:42:43 eventyay sshd[25548]: Failed password for postgres from 167.99.131.243 port 55654 ssh2
May  6 07:46:23 eventyay sshd[25778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.131.243
May  6 07:46:24 eventyay sshd[25778]: Failed password for invalid user app from 167.99.131.243 port 36692 ssh2
...
2020-05-06 13:50:42
114.67.176.63 attackspam
$f2bV_matches
2020-05-06 13:08:32
112.85.42.187 attack
2020-05-06T06:36:45.173462centos sshd[24863]: Failed password for root from 112.85.42.187 port 17881 ssh2
2020-05-06T06:36:48.012545centos sshd[24863]: Failed password for root from 112.85.42.187 port 17881 ssh2
2020-05-06T06:36:49.989354centos sshd[24863]: Failed password for root from 112.85.42.187 port 17881 ssh2
...
2020-05-06 13:51:33

Recently Reported IPs

131.163.32.58 178.164.74.26 23.214.72.85 57.232.55.138
60.101.223.202 64.52.102.218 224.221.244.144 110.135.252.124
80.6.127.45 188.217.102.57 103.80.166.16 74.249.45.91
72.16.87.197 103.76.63.94 217.138.92.100 203.212.107.154
145.1.123.25 176.188.29.154 152.94.173.163 154.95.53.39