Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.117.201.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.117.201.199.		IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070301 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 04 12:16:29 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 199.201.117.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.201.117.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.196.83.98 attack
Invalid user ev from 223.196.83.98 port 32854
2019-10-22 07:49:36
95.181.132.140 attack
Unauthorized connection attempt from IP address 95.181.132.140 on Port 445(SMB)
2019-10-22 08:07:03
46.188.49.190 attackbots
Unauthorized connection attempt from IP address 46.188.49.190 on Port 445(SMB)
2019-10-22 07:48:20
162.247.74.7 attackbots
Oct 22 00:33:02 rotator sshd\[10408\]: Failed password for root from 162.247.74.7 port 34478 ssh2Oct 22 00:33:05 rotator sshd\[10408\]: Failed password for root from 162.247.74.7 port 34478 ssh2Oct 22 00:33:07 rotator sshd\[10408\]: Failed password for root from 162.247.74.7 port 34478 ssh2Oct 22 00:33:10 rotator sshd\[10408\]: Failed password for root from 162.247.74.7 port 34478 ssh2Oct 22 00:33:13 rotator sshd\[10408\]: Failed password for root from 162.247.74.7 port 34478 ssh2Oct 22 00:33:15 rotator sshd\[10408\]: Failed password for root from 162.247.74.7 port 34478 ssh2
...
2019-10-22 07:37:41
183.82.100.107 attackspambots
Unauthorized connection attempt from IP address 183.82.100.107 on Port 445(SMB)
2019-10-22 07:45:54
71.6.232.5 attackspam
UTC: 2019-10-21 port: 53/tcp
2019-10-22 12:02:16
45.114.244.56 attackbots
Oct 22 01:44:19 ncomp sshd[10892]: Invalid user postgres from 45.114.244.56
Oct 22 01:44:19 ncomp sshd[10892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.244.56
Oct 22 01:44:19 ncomp sshd[10892]: Invalid user postgres from 45.114.244.56
Oct 22 01:44:21 ncomp sshd[10892]: Failed password for invalid user postgres from 45.114.244.56 port 49838 ssh2
2019-10-22 07:45:06
49.51.160.47 attack
UTC: 2019-10-21 port: 70/tcp
2019-10-22 12:00:38
192.210.134.2 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: 192-210-134-2-host.colocrossing.com.
2019-10-22 07:42:06
218.1.18.78 attack
Oct 21 19:20:20 *** sshd[11651]: Failed password for invalid user ubnt from 218.1.18.78 port 21487 ssh2
Oct 21 19:25:49 *** sshd[11729]: Failed password for invalid user hadoop from 218.1.18.78 port 38443 ssh2
Oct 21 19:31:21 *** sshd[11764]: Failed password for invalid user webmaster from 218.1.18.78 port 55408 ssh2
Oct 21 19:44:38 *** sshd[11953]: Failed password for invalid user genival from 218.1.18.78 port 32851 ssh2
Oct 21 19:50:05 *** sshd[12014]: Failed password for invalid user User from 218.1.18.78 port 49800 ssh2
Oct 21 20:24:11 *** sshd[12391]: Failed password for invalid user ubnt from 218.1.18.78 port 38560 ssh2
Oct 21 20:29:43 *** sshd[12459]: Failed password for invalid user zhz from 218.1.18.78 port 55513 ssh2
Oct 21 20:35:08 *** sshd[12490]: Failed password for invalid user tl from 218.1.18.78 port 15975 ssh2
Oct 21 20:40:38 *** sshd[12586]: Failed password for invalid user zk from 218.1.18.78 port 32934 ssh2
Oct 21 20:51:20 *** sshd[12709]: Failed password for invalid user om from 218.1.18.
2019-10-22 07:56:53
193.56.28.182 attack
Trying to log into mailserver (postfix/smtp) using multiple names and passwords
2019-10-22 08:12:37
103.254.175.52 attackbotsspam
Unauthorized connection attempt from IP address 103.254.175.52 on Port 445(SMB)
2019-10-22 08:04:10
173.208.152.250 attack
Unauthorised access (Oct 22) SRC=173.208.152.250 LEN=52 TTL=241 ID=4678 TCP DPT=1433 WINDOW=63443 SYN
2019-10-22 12:00:03
85.140.2.106 attackspam
Chat Spam
2019-10-22 07:58:45
175.197.233.197 attack
Oct 21 18:59:50 plusreed sshd[10371]: Invalid user PASSWORT from 175.197.233.197
...
2019-10-22 08:06:33

Recently Reported IPs

141.98.11.61 13.186.245.83 103.163.220.250 173.82.226.197
110.86.172.118 46.176.171.229 195.133.38.229 49.50.102.217
111.90.150.147 183.233.188.183 201.142.240.87 23.234.207.208
187.150.91.146 122.117.235.171 86.18.21.80 183.157.175.227
108.27.54.116 61.81.60.76 85.116.125.252 82.165.78.40