Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.80.211.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.80.211.42.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:14:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.211.80.114.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 114.80.211.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.205.7.148 attackbotsspam
Attempted connection to port 445.
2020-09-03 23:34:57
103.43.185.142 attackspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.185.142 
Failed password for invalid user magno from 103.43.185.142 port 60250 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.185.142
2020-09-03 23:51:45
106.54.191.247 attackbotsspam
Invalid user terry from 106.54.191.247 port 52968
2020-09-03 23:19:50
61.177.172.128 attackspambots
Sep  3 17:57:43 sso sshd[26645]: Failed password for root from 61.177.172.128 port 58611 ssh2
Sep  3 17:57:55 sso sshd[26645]: Failed password for root from 61.177.172.128 port 58611 ssh2
Sep  3 17:57:55 sso sshd[26645]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 58611 ssh2 [preauth]
...
2020-09-03 23:58:47
5.206.4.170 attackspam
1599065142 - 09/02/2020 18:45:42 Host: 5.206.4.170/5.206.4.170 Port: 445 TCP Blocked
2020-09-04 00:02:02
141.212.123.189 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-03 23:57:21
177.41.92.48 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-03 23:44:31
157.46.121.30 attack
Unauthorized connection attempt from IP address 157.46.121.30 on Port 445(SMB)
2020-09-03 23:39:02
31.223.43.131 attackspam
Attempted connection to port 80.
2020-09-03 23:28:50
182.61.161.121 attackbots
Invalid user grafana from 182.61.161.121 port 52400
2020-09-03 23:17:41
219.147.112.150 attack
22,59-01/01 [bc02/m11] PostRequest-Spammer scoring: harare01_holz
2020-09-03 23:13:21
2.57.122.113 attack
 TCP (SYN) 2.57.122.113:56025 -> port 37215, len 44
2020-09-03 23:31:33
201.208.238.50 attackbots
Attempted connection to port 445.
2020-09-03 23:29:47
80.82.68.218 attack
Attempted connection to port 3389.
2020-09-04 00:01:03
189.80.32.131 attackspam
Unauthorized connection attempt from IP address 189.80.32.131 on Port 445(SMB)
2020-09-03 23:38:14

Recently Reported IPs

114.96.199.146 114.96.218.54 114.97.141.133 114.97.141.13
114.97.243.69 114.97.185.124 114.97.35.191 114.97.37.17
235.180.235.99 114.97.55.125 114.97.61.31 114.97.64.193
114.97.96.135 114.97.97.164 114.97.65.199 114.97.97.122
114.97.97.2 114.97.96.133 114.98.178.23 114.98.173.47