Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: StarHub

Hostname: unknown

Organization: StarHub Ltd

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.117.14.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62583
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;203.117.14.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 08:21:30 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 48.14.117.203.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 48.14.117.203.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
74.125.140.26 attack
SSH login attempts.
2020-07-10 02:29:12
88.151.101.215 attackbots
SSH login attempts.
2020-07-10 02:32:22
82.228.108.208 attackbots
SSH login attempts.
2020-07-10 02:41:18
136.61.209.73 attackspambots
2020-07-09T20:31:31.314832afi-git.jinr.ru sshd[5547]: Invalid user shoumengna from 136.61.209.73 port 41160
2020-07-09T20:31:31.318255afi-git.jinr.ru sshd[5547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.61.209.73
2020-07-09T20:31:31.314832afi-git.jinr.ru sshd[5547]: Invalid user shoumengna from 136.61.209.73 port 41160
2020-07-09T20:31:32.812043afi-git.jinr.ru sshd[5547]: Failed password for invalid user shoumengna from 136.61.209.73 port 41160 ssh2
2020-07-09T20:33:08.846045afi-git.jinr.ru sshd[5918]: Invalid user andria from 136.61.209.73 port 36786
...
2020-07-10 02:17:59
124.152.118.131 attackspam
Jul  9 17:33:32 ip-172-31-62-245 sshd\[25278\]: Invalid user arkserver from 124.152.118.131\
Jul  9 17:33:34 ip-172-31-62-245 sshd\[25278\]: Failed password for invalid user arkserver from 124.152.118.131 port 3221 ssh2\
Jul  9 17:34:46 ip-172-31-62-245 sshd\[25298\]: Invalid user yosef from 124.152.118.131\
Jul  9 17:34:48 ip-172-31-62-245 sshd\[25298\]: Failed password for invalid user yosef from 124.152.118.131 port 3222 ssh2\
Jul  9 17:36:00 ip-172-31-62-245 sshd\[25333\]: Invalid user adm from 124.152.118.131\
2020-07-10 02:36:28
129.28.78.8 attackspam
Jul 10 02:54:58 localhost sshd[2547460]: Invalid user genevieve from 129.28.78.8 port 45198
...
2020-07-10 02:19:13
83.144.90.174 attack
SSH login attempts.
2020-07-10 02:15:12
157.47.231.23 attack
1594296264 - 07/09/2020 14:04:24 Host: 157.47.231.23/157.47.231.23 Port: 445 TCP Blocked
2020-07-10 02:09:23
159.149.10.20 attackspam
SSH login attempts.
2020-07-10 02:41:07
89.22.180.208 attack
Jul  9 19:02:37 Ubuntu-1404-trusty-64-minimal sshd\[9020\]: Invalid user velarde from 89.22.180.208
Jul  9 19:02:37 Ubuntu-1404-trusty-64-minimal sshd\[9020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.180.208
Jul  9 19:02:39 Ubuntu-1404-trusty-64-minimal sshd\[9020\]: Failed password for invalid user velarde from 89.22.180.208 port 41948 ssh2
Jul  9 19:18:13 Ubuntu-1404-trusty-64-minimal sshd\[12665\]: Invalid user batman from 89.22.180.208
Jul  9 19:18:13 Ubuntu-1404-trusty-64-minimal sshd\[12665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.180.208
2020-07-10 02:34:12
139.255.93.18 attackspam
Port Scan detected!
...
2020-07-10 02:36:13
149.56.28.2 attack
 TCP (SYN) 149.56.28.2:55610 -> port 3394, len 44
2020-07-10 02:22:50
45.141.84.110 attackbots
Jul  9 20:29:51 debian-2gb-nbg1-2 kernel: \[16577983.954795\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.110 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=63834 PROTO=TCP SPT=52451 DPT=8877 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-10 02:32:54
45.6.72.17 attackbotsspam
Jul  9 17:15:11 mout sshd[18404]: Invalid user nagios from 45.6.72.17 port 59172
Jul  9 17:15:13 mout sshd[18404]: Failed password for invalid user nagios from 45.6.72.17 port 59172 ssh2
Jul  9 17:15:13 mout sshd[18404]: Disconnected from invalid user nagios 45.6.72.17 port 59172 [preauth]
2020-07-10 02:30:46
189.93.126.171 attackspam
SSH login attempts.
2020-07-10 02:17:11

Recently Reported IPs

71.92.29.239 181.46.57.98 104.233.137.108 100.0.184.141
132.148.129.251 180.203.234.181 80.46.129.220 144.71.165.24
117.204.236.247 121.174.70.131 181.109.49.15 104.197.109.175
89.210.93.10 183.157.169.179 204.68.114.73 71.133.40.81
50.38.49.49 165.28.201.207 200.194.26.13 92.198.36.113