Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.4.249.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.4.249.220.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:46:53 CST 2022
;; MSG SIZE  rcvd: 104
Host info
220.249.4.1.in-addr.arpa domain name pointer node-o2k.pool-1-4.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.249.4.1.in-addr.arpa	name = node-o2k.pool-1-4.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.145.168.39 spambotsattackproxynormal
Asc wsc wsc halka ay magaalada Hackney oo
2022-09-10 06:06:51
125.162.208.89 attack
sy bukan teroris
2022-09-07 02:53:21
6.142.36.118 attackproxy
😂😂
2022-08-15 15:11:55
84.17.43.243 spambotsattack
bot that uses leaked databases for account hijacking
2022-09-11 19:01:48
107.180.46.26 normal
secureserver
2022-08-12 04:32:28
174.127.195.30 spambotsattackproxynormal
John Fitz Marcus Hook pa
2022-08-22 20:06:19
2001: DB8: 0: 0: 8: 800: 200C: 417A spambotsattackproxynormal
2048
2022-09-04 22:46:34
87.249.132.148 attack
Constantely try to log to my QNAP NAS
2022-08-17 00:42:26
163.171.132.38 attack
Sxan port
2022-08-08 12:59:49
110.137.195.237 spamattack
110.137.195.237
2022-09-06 14:09:31
89.248.163.162 attack
Port Scan< Hack
2022-09-12 12:40:39
167.99.248.252 attack
Sep  3 05:31:57 host sshd[2214]: Failed password for root from 167.99.248.252 port 40276 ssh2
Sep  3 05:31:57 host sshd[2203]: Failed password for root from 167.99.248.252 port 39580 ssh2
Sep  3 05:31:57 host sshd[2179]: Failed password for root from 167.99.248.252 port 38018 ssh2
Sep  3 05:31:57 host sshd[2196]: Failed password for root from 167.99.248.252 port 39254 ssh2
2022-09-05 08:21:45
103.145.13.88 attack
Port Scan
2022-08-18 13:44:23
10.76.217.45 spambotsattackproxynormal
apn celcom 4G  fast speed in Malaysia for mobile redmi note 11 pro
2022-08-18 07:14:27
222.252.29.244 attack
Hacker
2022-08-09 23:05:04

Recently Reported IPs

1.4.249.183 1.4.249.194 1.4.249.206 1.4.249.184
1.4.249.37 1.4.249.31 104.18.21.198 1.4.249.229
1.4.249.196 1.4.249.38 1.4.249.47 1.4.249.56
1.4.249.54 1.4.249.53 1.4.249.95 1.4.249.89
1.4.250.104 1.4.249.72 1.4.249.63 1.4.250.113