Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.242.241.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.242.241.149.			IN	A

;; AUTHORITY SECTION:
.			441	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:33:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
149.241.242.2.in-addr.arpa domain name pointer dynamic-002-242-241-149.2.242.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.241.242.2.in-addr.arpa	name = dynamic-002-242-241-149.2.242.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.194.17 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:33:29
190.75.16.191 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:46:30
192.241.221.89 attackspam
Scan or attack attempt on email service.
2020-03-02 08:15:10
192.241.198.223 attack
Unauthorized connection attempt detected from IP address 192.241.198.223 to port 587 [J]
2020-03-02 08:32:29
192.241.212.225 attackbots
firewall-block, port(s): 465/tcp
2020-03-02 08:21:43
192.241.213.153 attack
Scan or attack attempt on email service.
2020-03-02 08:21:20
189.112.239.55 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:53:14
190.201.255.173 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:42:28
192.140.147.80 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:35:25
190.27.198.74 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:48:42
192.241.207.118 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-03-02 08:29:18
192.241.217.63 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:18:24
192.3.204.74 attack
03/01/2020-18:45:37.510388 192.3.204.74 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-02 08:36:36
192.241.209.175 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:28:36
190.201.128.185 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 08:42:55

Recently Reported IPs

167.169.61.150 43.105.194.27 213.83.164.235 97.102.114.99
66.252.80.174 204.2.140.36 30.71.149.110 98.54.191.78
176.111.230.219 73.43.252.150 12.200.122.10 120.103.206.90
176.41.215.207 60.249.205.91 218.127.86.39 185.28.248.208
85.89.246.181 9.28.233.31 45.246.140.125 81.167.111.44