Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.49.242.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.49.242.121.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:38:26 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 121.242.49.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.242.49.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.118.37.81 attackspam
28.06.2019 16:11:34 Connection to port 15896 blocked by firewall
2019-06-29 01:34:09
164.132.230.244 attack
Jun 28 19:08:16 s1 wordpress\(www.dance-corner.de\)\[27915\]: Authentication attempt for unknown user fehst from 164.132.230.244
...
2019-06-29 01:14:05
189.68.229.17 attackbots
[Thu Jun 27 17:29:06.418658 2019] [:error] [pid 6565:tid 140348458202880] [client 189.68.229.17:32877] [client 189.68.229.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.1.1/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "792"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197:80"] [severity "WARNING"] [ver "OWASP_CRS/3.1.1"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XRSacgTAE6Fl0cyL6JqMuAAAABM"]
...
2019-06-29 01:21:33
177.21.198.216 attack
SMTP-sasl brute force
...
2019-06-29 01:54:05
94.124.75.25 attackbotsspam
Jun2815:19:10server6dovecot:imap-login:Disconnected\(authfailed\,1attemptsin5secs\):user=\\,method=PLAIN\,rip=94.124.75.25\,lip=81.17.25.249\,session=\<2xJnH2KMUuxefEsZ\>Jun2815:19:10server6dovecot:imap-login:Disconnected\(authfailed\,1attemptsin5secs\):user=\\,method=PLAIN\,rip=94.124.75.25\,lip=81.17.25.249\,session=\Jun2815:19:27server6dovecot:imap-login:Disconnected\(authfailed\,1attemptsin16secs\):user=\\,method=PLAIN\,rip=94.124.75.25\,lip=81.17.25.249\,session=\Jun2815:19:27server6dovecot:imap-login:Disconnected\(authfailed\,1attemptsin10secs\):user=\\,method=PLAIN\,rip=94.124.75.25\,lip=81.17.25.249\,session=\Jun2815:30:35server6dovecot:imap-login:Disconnected\(authfailed\,1attemptsin7secs\):user=\\,method=PLAIN\,rip=94.124.75.25\,lip=81.17.25.249\,session=\<95IlSGKMmOxefEsZ\>Jun2815
2019-06-29 01:54:36
104.236.112.52 attack
SSH Brute-Forcing (ownc)
2019-06-29 01:57:59
218.95.153.90 attackspambots
'IP reached maximum auth failures for a one day block'
2019-06-29 01:33:45
191.96.133.88 attackbots
Jun 28 19:18:07 apollo sshd\[26574\]: Invalid user guest from 191.96.133.88Jun 28 19:18:09 apollo sshd\[26574\]: Failed password for invalid user guest from 191.96.133.88 port 59828 ssh2Jun 28 19:20:34 apollo sshd\[26581\]: Invalid user sdtdserver from 191.96.133.88
...
2019-06-29 02:11:34
77.247.109.30 attack
Portscan or hack attempt detected by psad/fwsnort
2019-06-29 01:25:26
219.93.67.113 attack
Jun 28 15:27:41 ovpn sshd\[27972\]: Invalid user kafka from 219.93.67.113
Jun 28 15:27:41 ovpn sshd\[27972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.67.113
Jun 28 15:27:43 ovpn sshd\[27972\]: Failed password for invalid user kafka from 219.93.67.113 port 38498 ssh2
Jun 28 15:46:23 ovpn sshd\[28620\]: Invalid user nationale from 219.93.67.113
Jun 28 15:46:23 ovpn sshd\[28620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.67.113
2019-06-29 01:37:13
94.23.196.208 attackspam
IP address [94.23.196.208] of xxx has been blocked by RSYNC
2019-06-29 01:45:23
170.239.41.35 attackspam
SMTP-sasl brute force
...
2019-06-29 01:31:53
187.120.128.45 attackspambots
SMTP-sasl brute force
...
2019-06-29 02:03:08
150.161.8.120 attackbotsspam
Jun 28 17:35:52 mail sshd[22406]: Invalid user developer from 150.161.8.120
Jun 28 17:35:52 mail sshd[22406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.8.120
Jun 28 17:35:52 mail sshd[22406]: Invalid user developer from 150.161.8.120
Jun 28 17:35:54 mail sshd[22406]: Failed password for invalid user developer from 150.161.8.120 port 38102 ssh2
Jun 28 17:39:01 mail sshd[27314]: Invalid user rajat from 150.161.8.120
...
2019-06-29 01:45:44
106.13.4.172 attack
2019-06-26 08:39:28 server sshd[86018]: Failed password for invalid user tomcat from 106.13.4.172 port 42476 ssh2
2019-06-29 01:32:14

Recently Reported IPs

0.5.22.239 0.47.14.184 0.5.203.171 0.47.195.240
0.47.145.27 0.48.103.140 0.49.213.24 0.48.215.6
1.12.96.226 1.126.112.13 0.5.179.38 0.5.110.142
0.47.153.242 1.123.24.195 0.48.235.126 0.50.220.181
1.120.234.96 1.121.223.217 1.124.251.227 0.49.190.43