Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Suncheon

Region: Jeollanam-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.249.202.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49344
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.249.202.134.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020701 1800 900 604800 86400

;; Query time: 140 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 08 04:56:30 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 134.202.249.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.202.249.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.17.145.227 attack
Unauthorized connection attempt from IP address 187.17.145.227 on Port 445(SMB)
2019-10-10 00:49:31
91.121.210.168 attack
Oct 07 20:21:53 host sshd[15933]: Invalid user system from 91.121.210.168 port 39017
2019-10-10 00:56:32
106.12.27.46 attackspambots
Automatic report - Banned IP Access
2019-10-10 01:11:03
36.91.75.125 attack
Unauthorized connection attempt from IP address 36.91.75.125 on Port 445(SMB)
2019-10-10 01:20:17
13.55.234.113 attackbotsspam
Automatic report - Banned IP Access
2019-10-10 01:23:40
87.117.178.32 attackspam
Unauthorized connection attempt from IP address 87.117.178.32 on Port 445(SMB)
2019-10-10 01:16:43
12.160.151.34 attack
Oct 07 20:21:31 host sshd[15925]: Failed password for invalid user root from 12.160.151.34 port 35006
2019-10-10 00:58:49
121.159.135.131 attackspam
Oct 07 20:21:49 host sshd[15931]: Invalid user administrator from 121.159.135.131 port 60090
2019-10-10 00:55:05
62.201.255.118 attack
Unauthorized connection attempt from IP address 62.201.255.118 on Port 445(SMB)
2019-10-10 01:01:41
41.39.38.182 attackbots
Unauthorized connection attempt from IP address 41.39.38.182 on Port 445(SMB)
2019-10-10 01:26:42
36.236.15.113 attackspambots
" "
2019-10-10 01:30:19
23.245.188.235 attack
WordPress XMLRPC scan :: 23.245.188.235 0.128 BYPASS [09/Oct/2019:22:32:45  1100] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/7.3.99"
2019-10-10 00:59:40
81.139.60.251 attackbotsspam
2019-10-09T13:32:47.087835homeassistant sshd[24423]: Unable to negotiate with 81.139.60.251 port 45790: no matching host key type found. Their offer: ssh-dss [preauth]
2019-10-09T13:32:47.300966homeassistant sshd[24425]: Invalid user NULL from 81.139.60.251 port 45808
...
2019-10-10 00:57:18
174.16.187.23 attack
Automatic report - Port Scan Attack
2019-10-10 00:50:09
80.82.64.127 attack
Automatic report - Port Scan
2019-10-10 01:06:55

Recently Reported IPs

223.189.158.100 181.23.182.137 200.172.95.221 168.15.75.236
195.55.45.72 159.8.238.41 63.183.102.141 94.45.178.65
148.255.89.235 108.47.12.93 108.48.214.199 110.144.10.229
78.164.126.117 220.46.1.142 50.46.107.97 123.166.214.68
209.77.180.209 156.57.245.18 159.122.123.11 85.226.46.191