Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.40.242.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.40.242.249.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030100 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 15:51:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 249.242.40.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.242.40.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.142.195.2 attackspam
Rude login attack (1472 tries in 1d)
2020-04-21 06:54:07
89.248.160.150 attackbots
89.248.160.150 was recorded 22 times by 12 hosts attempting to connect to the following ports: 1284,1282,1408. Incident counter (4h, 24h, all-time): 22, 113, 11889
2020-04-21 06:36:33
31.184.199.114 attack
Invalid user 101 from 31.184.199.114 port 4397
2020-04-21 06:47:57
130.61.247.249 attack
SSH login attempts
2020-04-21 07:00:53
5.135.152.97 attackspam
Apr 20 23:42:00 ourumov-web sshd\[25803\]: Invalid user test from 5.135.152.97 port 49308
Apr 20 23:42:00 ourumov-web sshd\[25803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.152.97
Apr 20 23:42:02 ourumov-web sshd\[25803\]: Failed password for invalid user test from 5.135.152.97 port 49308 ssh2
...
2020-04-21 06:46:27
190.196.64.93 attackbots
2020-04-20T19:51:06.715971shield sshd\[18730\]: Invalid user hadoop from 190.196.64.93 port 35244
2020-04-20T19:51:06.718659shield sshd\[18730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.64.93
2020-04-20T19:51:08.401557shield sshd\[18730\]: Failed password for invalid user hadoop from 190.196.64.93 port 35244 ssh2
2020-04-20T19:54:44.489347shield sshd\[19657\]: Invalid user test123 from 190.196.64.93 port 49070
2020-04-20T19:54:44.492982shield sshd\[19657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.64.93
2020-04-21 07:01:57
115.124.64.126 attackspam
prod11
...
2020-04-21 06:55:00
77.245.155.173 attackbots
SSH Invalid Login
2020-04-21 06:30:48
103.141.194.35 attack
Apr 21 01:06:02 hosting sshd[13083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.194.35  user=root
Apr 21 01:06:04 hosting sshd[13083]: Failed password for root from 103.141.194.35 port 43038 ssh2
...
2020-04-21 06:31:38
122.155.11.89 attack
Invalid user bm from 122.155.11.89 port 60260
2020-04-21 06:47:26
88.230.67.186 attack
Unauthorized connection attempt detected from IP address 88.230.67.186 to port 445
2020-04-21 07:02:38
74.199.108.162 attackbotsspam
$f2bV_matches
2020-04-21 06:59:30
185.176.27.98 attackbotsspam
04/20/2020-17:18:59.112573 185.176.27.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-21 06:33:00
185.50.149.24 attack
Apr 20 22:21:27 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 20 22:21:43 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 20 23:31:52 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 21 00:42:33 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 21 00:42:49 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
...
2020-04-21 06:51:09
63.245.119.130 attack
port scan and connect, tcp 23 (telnet)
2020-04-21 07:03:23

Recently Reported IPs

106.40.242.250 106.40.242.253 106.40.242.242 106.40.242.26
106.40.242.240 106.40.242.254 106.40.242.28 104.248.238.159
106.40.242.36 106.40.242.32 106.40.242.30 106.40.242.35
106.40.242.39 106.40.242.37 106.40.242.44 106.40.242.40
106.40.242.4 104.248.238.205 106.41.238.87 106.41.93.190