Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: China Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.80.7.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54347
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.80.7.243.			IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091901 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 20 09:16:27 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 243.7.80.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.7.80.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.23.204.136 attackspam
Automatic report - Banned IP Access
2019-08-01 02:17:01
51.68.46.156 attackbotsspam
Jul 31 17:59:40 bouncer sshd\[19563\]: Invalid user eclipse from 51.68.46.156 port 36246
Jul 31 17:59:40 bouncer sshd\[19563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.46.156 
Jul 31 17:59:42 bouncer sshd\[19563\]: Failed password for invalid user eclipse from 51.68.46.156 port 36246 ssh2
...
2019-08-01 02:20:27
137.74.25.247 attack
Invalid user kendrick from 137.74.25.247 port 57537
2019-08-01 02:10:41
104.248.255.118 attack
Invalid user usuario from 104.248.255.118 port 40920
2019-08-01 02:14:59
123.142.192.18 attackbotsspam
Jul 31 15:48:55 localhost sshd\[32226\]: Invalid user raluca from 123.142.192.18 port 54850
Jul 31 15:48:55 localhost sshd\[32226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.192.18
Jul 31 15:48:58 localhost sshd\[32226\]: Failed password for invalid user raluca from 123.142.192.18 port 54850 ssh2
...
2019-08-01 02:45:47
130.180.193.73 attackspambots
Invalid user gmike from 130.180.193.73 port 39416
2019-08-01 02:45:12
68.183.24.254 attack
Invalid user pentaho from 68.183.24.254 port 59144
2019-08-01 02:37:47
107.170.172.23 attackbots
IP attempted unauthorised action
2019-08-01 01:58:05
47.74.148.22 attackbotsspam
Invalid user grandma from 47.74.148.22 port 39680
2019-08-01 02:50:08
118.24.84.203 attackspambots
Jul 31 13:35:00 raspberrypi sshd\[12779\]: Invalid user won from 118.24.84.203Jul 31 13:35:02 raspberrypi sshd\[12779\]: Failed password for invalid user won from 118.24.84.203 port 59304 ssh2Jul 31 13:40:32 raspberrypi sshd\[12968\]: Failed password for root from 118.24.84.203 port 50519 ssh2
...
2019-08-01 02:14:39
14.172.173.67 attackbots
Invalid user admin from 14.172.173.67 port 56049
2019-08-01 02:06:20
107.172.3.124 attackspambots
2019-06-20T10:33:38.211Z CLOSE host=107.172.3.124 port=52678 fd=4 time=52.996 bytes=9304
...
2019-08-01 02:46:27
151.80.144.255 attack
Jun 30 17:52:33 dallas01 sshd[9508]: Failed password for vmail from 151.80.144.255 port 53287 ssh2
Jun 30 17:53:59 dallas01 sshd[9654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.255
Jun 30 17:54:01 dallas01 sshd[9654]: Failed password for invalid user grassi from 151.80.144.255 port 33444 ssh2
Jun 30 17:55:25 dallas01 sshd[9969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.255
2019-08-01 02:43:38
50.248.154.57 attackbots
Jul 31 18:26:24 localhost sshd\[31733\]: Invalid user zanni from 50.248.154.57 port 39796
Jul 31 18:26:24 localhost sshd\[31733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.248.154.57
Jul 31 18:26:26 localhost sshd\[31733\]: Failed password for invalid user zanni from 50.248.154.57 port 39796 ssh2
2019-08-01 02:21:23
178.128.201.59 attack
Jul 31 20:18:32 vmd17057 sshd\[20776\]: Invalid user virginio from 178.128.201.59 port 56276
Jul 31 20:18:32 vmd17057 sshd\[20776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.201.59
Jul 31 20:18:33 vmd17057 sshd\[20776\]: Failed password for invalid user virginio from 178.128.201.59 port 56276 ssh2
...
2019-08-01 02:28:46

Recently Reported IPs

198.202.208.245 204.197.180.189 31.242.11.5 91.104.142.171
106.111.76.64 97.48.74.31 209.221.8.200 60.65.135.205
87.144.41.90 12.65.184.9 81.204.37.51 73.10.248.97
179.146.49.73 195.119.112.91 223.27.2.7 206.81.251.93
79.97.94.75 105.248.39.78 165.89.115.6 139.213.78.253