Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.14.103.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.14.103.242.			IN	A

;; AUTHORITY SECTION:
.			306	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:24:01 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 242.103.14.111.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 111.14.103.242.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
103.131.71.110 attackbotsspam
(mod_security) mod_security (id:210730) triggered by 103.131.71.110 (VN/Vietnam/bot-103-131-71-110.coccoc.com): 5 in the last 3600 secs
2020-07-04 13:51:42
106.75.141.160 attackspambots
Jul  4 07:13:00 vpn01 sshd[20146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160
Jul  4 07:13:01 vpn01 sshd[20146]: Failed password for invalid user mysql from 106.75.141.160 port 44206 ssh2
...
2020-07-04 13:35:35
137.74.171.160 attackbotsspam
Jul  4 06:25:57 mail sshd[26259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.171.160
Jul  4 06:25:59 mail sshd[26259]: Failed password for invalid user jiale from 137.74.171.160 port 54674 ssh2
...
2020-07-04 13:31:41
183.238.155.66 attackbotsspam
Jul  4 02:13:12 jane sshd[28278]: Failed password for root from 183.238.155.66 port 46712 ssh2
...
2020-07-04 14:04:01
159.89.204.111 attack
Jul  4 02:27:31 ns382633 sshd\[1707\]: Invalid user ucc from 159.89.204.111 port 42204
Jul  4 02:27:31 ns382633 sshd\[1707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.204.111
Jul  4 02:27:34 ns382633 sshd\[1707\]: Failed password for invalid user ucc from 159.89.204.111 port 42204 ssh2
Jul  4 02:43:31 ns382633 sshd\[4475\]: Invalid user ajenti from 159.89.204.111 port 43772
Jul  4 02:43:31 ns382633 sshd\[4475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.204.111
2020-07-04 13:38:49
167.172.162.118 attackbotsspam
167.172.162.118 - - [04/Jul/2020:05:11:03 +0100] "POST /wp-login.php HTTP/1.1" 200 1951 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.162.118 - - [04/Jul/2020:05:11:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1993 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.162.118 - - [04/Jul/2020:05:11:04 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-04 14:01:32
58.211.27.68 attackspam
Port scan: Attack repeated for 24 hours
2020-07-04 13:29:09
176.99.215.61 attackspambots
 TCP (SYN) 176.99.215.61:38076 -> port 23, len 44
2020-07-04 14:09:27
45.148.10.183 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-07-04 13:49:53
92.222.72.234 attackspam
Automatic Fail2ban report - Trying login SSH
2020-07-04 13:32:11
170.231.56.6 attack
proto=tcp  .  spt=36730  .  dpt=25  .     Found on   Dark List de      (2)
2020-07-04 13:56:38
218.59.129.110 attackspam
Invalid user user0 from 218.59.129.110 port 24580
2020-07-04 13:59:30
59.63.225.114 attackbotsspam
2020-07-04T05:45:52.807012snf-827550 sshd[28850]: Invalid user zsd from 59.63.225.114 port 22034
2020-07-04T05:45:54.846890snf-827550 sshd[28850]: Failed password for invalid user zsd from 59.63.225.114 port 22034 ssh2
2020-07-04T05:48:31.164597snf-827550 sshd[28859]: Invalid user webadmin from 59.63.225.114 port 38503
...
2020-07-04 14:06:35
123.207.88.57 attackspambots
Jul  4 12:30:26 itv-usvr-01 sshd[7527]: Invalid user jake from 123.207.88.57
Jul  4 12:30:26 itv-usvr-01 sshd[7527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.88.57
Jul  4 12:30:26 itv-usvr-01 sshd[7527]: Invalid user jake from 123.207.88.57
Jul  4 12:30:28 itv-usvr-01 sshd[7527]: Failed password for invalid user jake from 123.207.88.57 port 43600 ssh2
Jul  4 12:32:56 itv-usvr-01 sshd[8071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.88.57  user=root
Jul  4 12:32:58 itv-usvr-01 sshd[8071]: Failed password for root from 123.207.88.57 port 41648 ssh2
2020-07-04 13:58:05
141.164.54.73 attack
Automated report (2020-07-04T07:12:11+08:00). Faked user agent detected.
2020-07-04 13:45:06

Recently Reported IPs

111.14.101.254 111.14.11.149 111.14.118.141 111.14.147.8
111.14.62.241 111.14.52.18 111.14.62.185 111.14.9.211
111.14.219.62 111.15.202.224 111.15.201.58 111.15.35.7
111.16.115.56 111.16.134.125 111.15.158.123 111.16.138.206
111.16.32.206 111.16.172.189 111.16.37.178 111.160.28.250