Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.42.121.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55678
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;147.42.121.249.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052302 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 24 11:45:28 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 249.121.42.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 249.121.42.147.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
179.147.123.225 attackbotsspam
Invalid user admin from 179.147.123.225 port 7453
2020-01-15 04:32:01
157.245.75.179 attack
Unauthorized connection attempt detected from IP address 157.245.75.179 to port 2220 [J]
2020-01-15 04:36:34
191.103.252.161 attack
Invalid user admin from 191.103.252.161 port 58257
2020-01-15 04:28:06
195.206.105.217 attackbots
Jan 14 18:22:09 server sshd\[8443\]: Invalid user support from 195.206.105.217
Jan 14 18:22:09 server sshd\[8443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=zrh-exit.privateinternetaccess.com 
Jan 14 18:22:11 server sshd\[8443\]: Failed password for invalid user support from 195.206.105.217 port 56322 ssh2
Jan 14 18:32:01 server sshd\[10986\]: Invalid user support from 195.206.105.217
Jan 14 18:32:01 server sshd\[10986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=zrh-exit.privateinternetaccess.com 
...
2020-01-15 04:25:50
77.247.181.162 attackbotsspam
Unauthorized connection attempt detected from IP address 77.247.181.162 to port 2222 [J]
2020-01-15 04:50:35
198.98.54.28 attackspambots
Jan 14 19:11:30 IngegnereFirenze sshd[29657]: Failed password for invalid user test from 198.98.54.28 port 51998 ssh2
...
2020-01-15 04:24:59
77.81.230.143 attackbots
Unauthorized connection attempt detected from IP address 77.81.230.143 to port 2220 [J]
2020-01-15 04:51:10
200.150.99.251 attackbots
Invalid user rack from 200.150.99.251 port 38239
2020-01-15 04:24:12
62.201.212.61 attack
Invalid user tit0nich from 62.201.212.61 port 58273
2020-01-15 04:52:32
62.102.148.68 attack
01/14/2020-14:34:21.555258 62.102.148.68 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 75
2020-01-15 04:53:13
138.197.36.189 attack
Unauthorized connection attempt detected from IP address 138.197.36.189 to port 2220 [J]
2020-01-15 04:40:13
220.179.249.21 attackspam
Invalid user admin from 220.179.249.21 port 33419
2020-01-15 04:20:46
82.221.128.191 attackbots
/viewforum.php?f=3
2020-01-15 04:49:25
162.247.74.7 attackspam
Invalid user openelec from 162.247.74.7 port 58688
2020-01-15 04:35:49
222.252.20.103 attackspambots
Invalid user admin from 222.252.20.103 port 47345
2020-01-15 04:19:55

Recently Reported IPs

110.122.14.94 160.153.147.137 41.128.168.39 190.128.149.66
213.109.74.1 186.103.160.114 216.244.66.227 125.16.169.10
201.159.97.205 185.30.83.81 89.171.211.186 183.103.150.75
117.4.153.199 193.188.22.112 200.216.249.122 217.70.21.228
51.159.4.237 221.155.220.144 38.205.15.50 176.40.105.245