Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.249.199.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.249.199.141.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:07:24 CST 2022
;; MSG SIZE  rcvd: 108
Host info
141.199.249.134.in-addr.arpa domain name pointer 134-249-199-141.broadband.kyivstar.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.199.249.134.in-addr.arpa	name = 134-249-199-141.broadband.kyivstar.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
170.82.7.250 attack
Unauthorized connection attempt detected from IP address 170.82.7.250 to port 80 [J]
2020-01-29 05:12:22
128.106.247.54 attackbots
Unauthorized connection attempt detected from IP address 128.106.247.54 to port 4567 [J]
2020-01-29 05:13:41
123.206.103.166 attackspam
Unauthorized connection attempt detected from IP address 123.206.103.166 to port 23 [J]
2020-01-29 04:55:39
197.48.102.85 attack
Unauthorized connection attempt detected from IP address 197.48.102.85 to port 23 [J]
2020-01-29 05:26:54
46.21.209.12 attack
Unauthorized connection attempt detected from IP address 46.21.209.12 to port 80 [J]
2020-01-29 05:02:08
125.99.148.116 attackspam
Unauthorized connection attempt detected from IP address 125.99.148.116 to port 80 [J]
2020-01-29 04:54:16
193.112.107.55 attack
Invalid user bhuvapati from 193.112.107.55 port 34702
2020-01-29 05:06:44
187.63.62.21 attack
Unauthorized connection attempt detected from IP address 187.63.62.21 to port 23 [J]
2020-01-29 05:07:32
49.51.160.201 attackspambots
Unauthorized connection attempt detected from IP address 49.51.160.201 to port 2443 [J]
2020-01-29 05:23:26
182.61.43.179 attackspambots
SSH Login Bruteforce
2020-01-29 04:50:56
122.115.38.196 attack
Unauthorized connection attempt detected from IP address 122.115.38.196 to port 1433 [J]
2020-01-29 05:14:33
134.175.133.74 attackspambots
Unauthorized connection attempt detected from IP address 134.175.133.74 to port 2220 [J]
2020-01-29 04:53:35
189.126.195.138 attack
Unauthorized connection attempt detected from IP address 189.126.195.138 to port 80 [J]
2020-01-29 04:46:20
177.245.187.114 attackbotsspam
Unauthorized connection attempt detected from IP address 177.245.187.114 to port 4567 [J]
2020-01-29 04:51:58
37.20.247.154 attackbotsspam
Unauthorized connection attempt detected from IP address 37.20.247.154 to port 8080 [J]
2020-01-29 05:25:01

Recently Reported IPs

134.249.199.140 134.249.199.142 134.249.199.143 134.249.199.144
134.249.199.146 134.249.199.148 118.173.161.17 134.249.199.15
134.249.199.156 134.249.199.154 134.249.199.158 134.249.199.161
134.249.199.16 134.249.199.168 134.249.199.163 118.173.161.223
134.249.199.176 134.249.199.182 134.249.199.190 134.249.199.194