Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.14.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.14.203.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 28 11:20:25 CST 2022
;; MSG SIZE  rcvd: 107
Host info
203.14.202.116.in-addr.arpa domain name pointer static.203.14.202.116.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
203.14.202.116.in-addr.arpa	name = static.203.14.202.116.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.141.152.103 attack
Automatic report - Port Scan Attack
2020-03-22 15:26:19
51.91.101.100 attackspambots
Mar 22 07:46:51 santamaria sshd\[15800\]: Invalid user mega from 51.91.101.100
Mar 22 07:46:51 santamaria sshd\[15800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.101.100
Mar 22 07:46:53 santamaria sshd\[15800\]: Failed password for invalid user mega from 51.91.101.100 port 34968 ssh2
...
2020-03-22 15:57:03
198.50.138.228 attackbots
Mar 22 08:03:32 srv206 sshd[28026]: Invalid user testnet from 198.50.138.228
Mar 22 08:03:32 srv206 sshd[28026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip228.ip-198-50-138.net
Mar 22 08:03:32 srv206 sshd[28026]: Invalid user testnet from 198.50.138.228
Mar 22 08:03:33 srv206 sshd[28026]: Failed password for invalid user testnet from 198.50.138.228 port 34674 ssh2
...
2020-03-22 15:23:27
69.94.158.122 attackspambots
Mar 22 04:27:57 mail.srvfarm.net postfix/smtpd[540953]: NOQUEUE: reject: RCPT from wandering.swingthelamp.com[69.94.158.122]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 22 04:27:58 mail.srvfarm.net postfix/smtpd[540953]: NOQUEUE: reject: RCPT from wandering.swingthelamp.com[69.94.158.122]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 22 04:27:59 mail.srvfarm.net postfix/smtpd[539385]: NOQUEUE: reject: RCPT from wandering.swingthelamp.com[69.94.158.122]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 22
2020-03-22 15:48:58
92.118.38.58 attackbots
Mar 22 08:00:20 mail.srvfarm.net postfix/smtpd[609570]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 22 08:00:50 mail.srvfarm.net postfix/smtpd[610240]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 22 08:01:21 mail.srvfarm.net postfix/smtpd[607495]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 22 08:01:58 mail.srvfarm.net postfix/smtpd[610240]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 22 08:02:21 mail.srvfarm.net postfix/smtpd[607495]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-22 15:13:42
51.89.149.213 attackspambots
Automatic report - SSH Brute-Force Attack
2020-03-22 15:54:21
165.227.26.69 attackspambots
$f2bV_matches
2020-03-22 15:37:16
172.81.226.147 attackspambots
$f2bV_matches
2020-03-22 15:11:56
177.19.187.79 attackbotsspam
Automatic report - WordPress Brute Force
2020-03-22 15:40:17
158.69.192.35 attackbots
Fail2Ban Ban Triggered (2)
2020-03-22 15:54:37
37.213.168.247 attackbots
SSH login attempts
2020-03-22 15:14:02
192.241.202.169 attack
Invalid user news from 192.241.202.169 port 33226
2020-03-22 15:39:10
95.130.125.233 attackspambots
Mar 22 04:32:34 mail.srvfarm.net postfix/smtpd[539385]: lost connection after STARTTLS from opr-61de.transfer-nst.com[95.130.125.233]
Mar 22 04:32:50 mail.srvfarm.net postfix/smtpd[541910]: lost connection after STARTTLS from opr-61de.transfer-nst.com[95.130.125.233]
Mar 22 04:34:06 mail.srvfarm.net postfix/smtpd[541938]: lost connection after RCPT from opr-61de.transfer-nst.com[95.130.125.233]
Mar 22 04:34:24 mail.srvfarm.net postfix/smtpd[541858]: lost connection after STARTTLS from opr-61de.transfer-nst.com[95.130.125.233]
Mar 22 04:35:54 mail.srvfarm.net postfix/smtpd[541938]: lost connection after CONNECT from opr-61de.transfer-nst.com[95.130.125.233]
2020-03-22 15:48:27
217.112.142.137 attack
Mar 22 05:51:15 mail.srvfarm.net postfix/smtpd[546752]: NOQUEUE: reject: RCPT from unknown[217.112.142.137]: 554 5.7.1 Service unavailable; Client host [217.112.142.137] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?217.112.142.137; from= to= proto=ESMTP helo=
Mar 22 05:51:16 mail.srvfarm.net postfix/smtpd[557306]: NOQUEUE: reject: RCPT from unknown[217.112.142.137]: 554 5.7.1 Service unavailable; Client host [217.112.142.137] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?217.112.142.137; from= to= proto=ESMTP helo=
Mar 22 05:51:16 mail.srvfarm.net postfix/smtpd[558952]: NOQUEUE: reject: RCPT from unknown[217.112.142.137]: 554 5.7.1 Service unavailable; Client host [217.112.142.137] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?217.112.142.137; from=
2020-03-22 15:42:16
37.120.12.212 attackbots
SSH Brute-Force Attack
2020-03-22 15:38:16

Recently Reported IPs

142.6.71.253 116.202.143.105 116.202.149.245 116.202.155.152
116.202.156.31 116.202.156.81 116.202.157.102 116.202.157.18
116.202.157.189 116.202.157.24 116.202.161.116 116.202.161.57
34.226.31.255 52.194.53.29 35.10.56.30 61.65.8.18
35.88.117.176 104.226.221.78 174.247.240.83 223.126.34.92