Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.116.111.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.116.111.142.		IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031401 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 15 04:50:30 CST 2020
;; MSG SIZE  rcvd: 119
Host info
142.111.116.114.in-addr.arpa domain name pointer ecs-114-116-111-142.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.111.116.114.in-addr.arpa	name = ecs-114-116-111-142.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.16.141.127 attack
Invalid user cron from 88.16.141.127 port 60200
2019-07-24 17:13:39
51.91.36.96 attackspambots
Invalid user zabbix from 51.91.36.96 port 60326
2019-07-24 17:53:47
45.67.14.148 attack
Invalid user oracle from 45.67.14.148 port 55986
2019-07-24 17:22:11
187.112.251.65 attackspambots
Invalid user user from 187.112.251.65 port 50763
2019-07-24 16:53:39
104.131.93.33 attack
Jul 24 10:46:29 cvbmail sshd\[20056\]: Invalid user qhsupport from 104.131.93.33
Jul 24 10:46:29 cvbmail sshd\[20056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.93.33
Jul 24 10:46:31 cvbmail sshd\[20056\]: Failed password for invalid user qhsupport from 104.131.93.33 port 48203 ssh2
2019-07-24 17:10:32
117.62.98.73 attackspambots
Invalid user admin from 117.62.98.73 port 51930
2019-07-24 17:07:54
221.125.165.59 attackbotsspam
Jul 24 10:36:17 minden010 sshd[14548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
Jul 24 10:36:19 minden010 sshd[14548]: Failed password for invalid user bogota from 221.125.165.59 port 41768 ssh2
Jul 24 10:41:09 minden010 sshd[16304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
...
2019-07-24 17:25:21
88.28.211.226 attackspambots
Invalid user raspberry from 88.28.211.226 port 49730
2019-07-24 17:49:21
79.7.217.174 attack
Invalid user larry from 79.7.217.174 port 64042
2019-07-24 17:15:10
178.128.57.96 attackspam
Invalid user vladimir from 178.128.57.96 port 57020
2019-07-24 16:57:26
138.68.231.144 attack
Invalid user test2 from 138.68.231.144 port 42970
2019-07-24 17:37:24
213.32.12.3 attack
Invalid user erver from 213.32.12.3 port 48676
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.12.3
Failed password for invalid user erver from 213.32.12.3 port 48676 ssh2
Invalid user linda from 213.32.12.3 port 44502
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.12.3
2019-07-24 16:48:41
138.68.186.24 attackspambots
Invalid user test7 from 138.68.186.24 port 36694
2019-07-24 17:38:01
23.242.175.252 attackspam
Invalid user redis from 23.242.175.252 port 44072
2019-07-24 17:57:54
197.33.37.60 attack
Invalid user admin from 197.33.37.60 port 40386
2019-07-24 16:52:25

Recently Reported IPs

196.235.177.70 146.199.22.219 50.52.239.22 34.210.167.154
3.112.111.12 50.38.243.17 58.127.104.77 52.48.226.125
14.166.25.86 178.201.19.157 178.55.204.20 142.232.67.1
205.120.8.24 82.94.79.232 87.219.208.79 87.83.104.155
173.168.113.184 95.60.63.173 32.52.20.252 220.2.249.80