Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kathmandu

Region: Province 3

Country: Nepal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
202.63.243.174 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/202.63.243.174/ 
 
 NP - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NP 
 NAME ASN : ASN4007 
 
 IP : 202.63.243.174 
 
 CIDR : 202.63.243.0/24 
 
 PREFIX COUNT : 91 
 
 UNIQUE IP COUNT : 25088 
 
 
 ATTACKS DETECTED ASN4007 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-05 07:25:57 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-05 17:52:23
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.63.243.0 - 202.63.243.255'

% Abuse contact for '202.63.243.0 - 202.63.243.255' is 'abuse@subisu.net.np'

inetnum:        202.63.243.0 - 202.63.243.255
netname:        SUBISU_Corporate_Pool24
descr:          SUBISU_Corporate_Pool24
country:        NP
admin-c:        ATC1-AP
tech-c:         DS625-AP
abuse-c:        AS2579-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-NP-SUBISU
mnt-irt:        IRT-SUBISUCABLENET-NP-NP
last-modified:  2021-02-02T16:05:28Z
source:         APNIC

irt:            IRT-SUBISUCABLENET-NP-NP
address:        PO Box: 6626, Baluwatar
address:        Kathmandu
address:        Nepal
e-mail:         engg@subisu.net.np
abuse-mailbox:  abuse@subisu.net.np
admin-c:        ATC1-AP
tech-c:         DS625-AP
auth:           # Filtered
remarks:        abuse@subisu.net.np is invalid
remarks:        engg@subisu.net.np was validated on 2026-03-19
mnt-by:         MAINT-NP-SUBISU
last-modified:  2026-03-19T05:44:02Z
source:         APNIC

role:           ABUSE SUBISUCABLENETNPNP
country:        ZZ
address:        PO Box: 6626, Baluwatar
address:        Kathmandu
address:        Nepal
phone:          +000000000
e-mail:         engg@subisu.net.np
admin-c:        ATC1-AP
tech-c:         DS625-AP
nic-hdl:        AS2579-AP
remarks:        Generated from irt object IRT-SUBISUCABLENET-NP-NP
remarks:        abuse@subisu.net.np is invalid
remarks:        engg@subisu.net.np was validated on 2026-03-19
abuse-mailbox:  abuse@subisu.net.np
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-19T05:44:28Z
source:         APNIC

person:         Amit Thapa Chhetri
address:        PO Box: 6626
address:        katmandu
country:        NP
phone:          +977-1-4429616
fax-no:         +977-1-4430572
e-mail:         amit@subisu.net.np
mnt-by:         MAINT-NP-SUBISU
nic-hdl:        ATC1-AP
last-modified:  2008-09-04T07:29:23Z
source:         APNIC

person:         Deepak Shrestha
address:        Subisu Cable Net
address:        PO Box 6626
address:        Kathmandu
country:        NP
phone:          +977-1-4429616
e-mail:         deepak@subisu.net.np
nic-hdl:        DS625-AP
mnt-by:         MAINT-NP-SUBISU
last-modified:  2008-09-04T07:50:52Z
source:         APNIC

% Information related to '202.63.243.0/24AS136762'

route:          202.63.243.0/24
origin:         AS136762
descr:          Subisu Cablenet
                PO Box 6626 Kathmandu
mnt-by:         MAINT-NP-SUBISU
last-modified:  2018-12-13T06:37:45Z
source:         APNIC

% Information related to '202.63.243.0/24AS4007'

route:          202.63.243.0/24
origin:         AS4007
descr:          Subisu Cablenet
                PO Box 6626 Kathmandu
mnt-by:         MAINT-NP-SUBISU
last-modified:  2018-12-13T06:32:42Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.63.243.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.63.243.200.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 12:30:54 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 200.243.63.202.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.243.63.202.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
213.148.213.99 attackbotsspam
2019-08-31T07:27:37.396493stark.klein-stark.info sshd\[9023\]: Invalid user service from 213.148.213.99 port 59926
2019-08-31T07:27:37.400631stark.klein-stark.info sshd\[9023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.213.99
2019-08-31T07:27:39.469572stark.klein-stark.info sshd\[9023\]: Failed password for invalid user service from 213.148.213.99 port 59926 ssh2
...
2019-08-31 18:34:46
27.111.36.136 attackbots
Invalid user cmte from 27.111.36.136 port 48864
2019-08-31 18:37:42
183.109.79.252 attackbots
Aug 31 09:39:41 cvbmail sshd\[9487\]: Invalid user bram from 183.109.79.252
Aug 31 09:39:41 cvbmail sshd\[9487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.79.252
Aug 31 09:39:43 cvbmail sshd\[9487\]: Failed password for invalid user bram from 183.109.79.252 port 39787 ssh2
2019-08-31 18:35:23
161.18.57.13 attack
MagicSpam Rule: Excessive Mail Rate Inbound; Spammer IP: 161.18.57.13
2019-08-31 18:21:00
116.118.1.196 attack
Aug 31 01:28:57 www_kotimaassa_fi sshd[6485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.118.1.196
...
2019-08-31 19:01:20
106.13.193.235 attackspambots
Aug 31 08:02:54 root sshd[20495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.193.235 
Aug 31 08:02:56 root sshd[20495]: Failed password for invalid user mlsmith from 106.13.193.235 port 55050 ssh2
Aug 31 08:06:00 root sshd[20552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.193.235 
...
2019-08-31 19:04:43
31.223.133.172 attackspambots
DDOS
2019-08-31 17:55:46
43.226.40.60 attackbots
Aug 31 01:29:17 localhost sshd\[17646\]: Invalid user itadmin from 43.226.40.60 port 45252
Aug 31 01:29:17 localhost sshd\[17646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.40.60
Aug 31 01:29:19 localhost sshd\[17646\]: Failed password for invalid user itadmin from 43.226.40.60 port 45252 ssh2
...
2019-08-31 18:50:47
49.50.76.29 attackbots
Aug 31 03:09:29 aat-srv002 sshd[5489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.76.29
Aug 31 03:09:31 aat-srv002 sshd[5489]: Failed password for invalid user ad from 49.50.76.29 port 53458 ssh2
Aug 31 03:14:43 aat-srv002 sshd[5627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.76.29
Aug 31 03:14:45 aat-srv002 sshd[5627]: Failed password for invalid user test1 from 49.50.76.29 port 43688 ssh2
...
2019-08-31 18:08:06
209.97.163.53 attackspam
Aug 31 08:34:05 www_kotimaassa_fi sshd[10401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.163.53
Aug 31 08:34:08 www_kotimaassa_fi sshd[10401]: Failed password for invalid user testsftp from 209.97.163.53 port 51992 ssh2
...
2019-08-31 18:45:39
202.21.113.238 attackbotsspam
Unauthorized connection attempt from IP address 202.21.113.238 on Port 445(SMB)
2019-08-31 17:57:19
221.126.225.184 attackspambots
Aug 31 03:27:37 v22019058497090703 sshd[22747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.126.225.184
Aug 31 03:27:39 v22019058497090703 sshd[22747]: Failed password for invalid user vbox from 221.126.225.184 port 48778 ssh2
Aug 31 03:28:42 v22019058497090703 sshd[22809]: Failed password for mysql from 221.126.225.184 port 49808 ssh2
...
2019-08-31 19:07:04
189.112.228.153 attack
Aug 30 16:54:50 hiderm sshd\[865\]: Invalid user pink from 189.112.228.153
Aug 30 16:54:50 hiderm sshd\[865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153
Aug 30 16:54:52 hiderm sshd\[865\]: Failed password for invalid user pink from 189.112.228.153 port 50587 ssh2
Aug 30 17:00:06 hiderm sshd\[1282\]: Invalid user juanda from 189.112.228.153
Aug 30 17:00:06 hiderm sshd\[1282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153
2019-08-31 18:36:19
58.219.142.138 attackspam
[portscan] tcp/22 [SSH]
*(RWIN=43660)(08311230)
2019-08-31 18:10:16
43.239.176.113 attackbots
2019-08-31T06:06:38.611876mizuno.rwx.ovh sshd[23430]: Connection from 43.239.176.113 port 30222 on 78.46.61.178 port 22
2019-08-31T06:06:39.996198mizuno.rwx.ovh sshd[23430]: Invalid user jenkins from 43.239.176.113 port 30222
2019-08-31T06:06:40.004458mizuno.rwx.ovh sshd[23430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.176.113
2019-08-31T06:06:38.611876mizuno.rwx.ovh sshd[23430]: Connection from 43.239.176.113 port 30222 on 78.46.61.178 port 22
2019-08-31T06:06:39.996198mizuno.rwx.ovh sshd[23430]: Invalid user jenkins from 43.239.176.113 port 30222
2019-08-31T06:06:42.242106mizuno.rwx.ovh sshd[23430]: Failed password for invalid user jenkins from 43.239.176.113 port 30222 ssh2
...
2019-08-31 18:43:50

Recently Reported IPs

7.84.28.154 194.187.177.15 190.145.123.18 66.132.172.130
2606:4700:10::6816:2296 2606:4700:10::6814:5751 2606:4700:10::6816:4646 2606:4700:10::6816:379d
2606:4700:10::6816:1907 2606:4700:10::6814:4596 2606:4700:10::6814:5417 2606:4700:10::6816:371
2606:4700:10::6814:8130 72.245.200.59 114.16.22.28 2606:4700:10::6816:4394
2606:4700:10::6814:5950 2606:4700:10::ac43:1128 110.78.158.233 2606:4700:10::6816:1323