Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Sprint

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.13.114.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;208.13.114.201.			IN	A

;; AUTHORITY SECTION:
.			318	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080801 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 09 07:52:14 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 201.114.13.208.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.114.13.208.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
194.165.133.143 attackbotsspam
firewall-block, port(s): 23/tcp
2019-06-22 13:15:57
207.46.13.102 attackspambots
Jun 22 04:39:05   TCP Attack: SRC=207.46.13.102 DST=[Masked] LEN=318 TOS=0x00 PREC=0x00 TTL=103  DF PROTO=TCP SPT=12879 DPT=80 WINDOW=64240 RES=0x00 ACK PSH URGP=0
2019-06-22 13:41:50
185.244.25.96 attackbots
8080/tcp
[2019-06-22]1pkt
2019-06-22 13:13:09
128.199.221.18 attackspambots
Jun 22 07:05:07 localhost sshd\[22058\]: Invalid user fin from 128.199.221.18 port 48349
Jun 22 07:05:07 localhost sshd\[22058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.221.18
Jun 22 07:05:09 localhost sshd\[22058\]: Failed password for invalid user fin from 128.199.221.18 port 48349 ssh2
2019-06-22 13:44:06
123.16.162.161 attackbots
445/tcp
[2019-06-22]1pkt
2019-06-22 12:54:29
142.93.39.29 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-06-22 12:49:50
178.128.55.67 attack
DATE:2019-06-22 06:44:28, IP:178.128.55.67, PORT:ssh brute force auth on SSH service (patata)
2019-06-22 13:28:39
1.172.190.54 attack
37215/tcp
[2019-06-22]1pkt
2019-06-22 13:13:51
58.210.6.53 attack
Jun 22 06:38:38 s64-1 sshd[8938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.6.53
Jun 22 06:38:40 s64-1 sshd[8938]: Failed password for invalid user appuser from 58.210.6.53 port 59289 ssh2
Jun 22 06:40:28 s64-1 sshd[8949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.6.53
...
2019-06-22 13:10:30
220.141.71.166 attack
37215/tcp
[2019-06-22]1pkt
2019-06-22 13:03:36
114.100.158.84 attackbots
23/tcp
[2019-06-22]1pkt
2019-06-22 12:48:42
87.5.203.34 attack
Automatic report - SSH Brute-Force Attack
2019-06-22 13:11:39
182.74.169.98 attackspam
Invalid user ansible from 182.74.169.98 port 54436
2019-06-22 13:23:54
221.140.112.105 attack
19/6/22@00:40:12: FAIL: IoT-Telnet address from=221.140.112.105
...
2019-06-22 13:15:36
94.191.58.184 attack
719 attempts to GET/POST various PHPs
2019-06-22 13:44:45

Recently Reported IPs

191.76.216.250 103.25.36.245 172.221.115.151 120.80.57.134
206.127.208.249 63.97.163.135 206.56.245.213 61.188.251.185
52.77.112.95 177.99.51.116 172.36.42.91 84.171.142.28
99.55.5.69 96.52.113.161 27.127.178.49 47.185.47.163
206.111.65.98 200.252.0.181 63.144.232.170 157.33.205.177