Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Baoqiao

Region: Shanghai

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.141.100.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.141.100.249.		IN	A

;; AUTHORITY SECTION:
.			149	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 10:35:57 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 249.100.141.117.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 249.100.141.117.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.72.218.107 attackspam
Unauthorized connection attempt from IP address 36.72.218.107 on Port 445(SMB)
2020-03-12 22:45:05
95.155.29.54 attackbots
2020-03-07T09:44:10.477Z CLOSE host=95.155.29.54 port=29449 fd=4 time=20.013 bytes=14
...
2020-03-12 22:39:43
91.211.205.89 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-12 23:09:55
91.80.168.123 attackspam
2019-12-10T15:33:52.229Z CLOSE host=91.80.168.123 port=43216 fd=4 time=20.019 bytes=20
...
2020-03-12 23:08:57
95.39.166.150 attack
2020-03-02T18:00:23.420Z CLOSE host=95.39.166.150 port=51720 fd=4 time=20.018 bytes=13
...
2020-03-12 22:32:34
95.35.176.14 attack
2019-11-28T05:53:48.787Z CLOSE host=95.35.176.14 port=45290 fd=4 time=20.020 bytes=23
...
2020-03-12 22:35:17
92.116.134.222 attackspambots
2019-11-01T06:05:22.554Z CLOSE host=92.116.134.222 port=33412 fd=4 time=30.031 bytes=50
...
2020-03-12 23:08:34
117.107.133.162 attack
Invalid user sandbox from 117.107.133.162 port 56016
2020-03-12 22:48:58
106.75.13.192 attackbotsspam
Invalid user caidanwei from 106.75.13.192 port 50974
2020-03-12 22:53:41
69.175.97.170 attackspambots
" "
2020-03-12 23:01:57
90.154.160.24 attackspambots
2020-02-09T15:48:02.657Z CLOSE host=90.154.160.24 port=49195 fd=4 time=20.013 bytes=27
...
2020-03-12 23:18:12
92.116.164.245 attackbotsspam
2019-12-08T04:45:39.012Z CLOSE host=92.116.164.245 port=45410 fd=4 time=30.023 bytes=34
...
2020-03-12 23:07:48
113.162.172.131 attack
suspicious action Thu, 12 Mar 2020 09:30:47 -0300
2020-03-12 22:49:25
213.74.151.130 attack
Unauthorized connection attempt from IP address 213.74.151.130 on Port 445(SMB)
2020-03-12 23:11:41
202.191.127.90 attackbotsspam
1584016852 - 03/12/2020 13:40:52 Host: 202.191.127.90/202.191.127.90 Port: 445 TCP Blocked
2020-03-12 22:48:12

Recently Reported IPs

199.74.220.50 209.129.64.217 211.231.106.243 185.189.182.234
14.128.38.222 42.247.104.151 71.102.246.166 114.252.167.193
128.199.182.174 183.93.124.158 211.227.42.245 184.118.131.213
35.63.181.114 10.66.120.29 205.233.242.16 211.92.89.160
19.196.213.131 34.126.172.105 7.131.237.117 13.213.14.234