Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.160.214.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.160.214.249.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:06:46 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 249.214.160.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.214.160.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.232.40.86 attackspambots
Unauthorized connection attempt detected from IP address 132.232.40.86 to port 2220 [J]
2020-01-29 05:41:51
93.150.12.182 attackbotsspam
Unauthorized connection attempt detected from IP address 93.150.12.182 to port 8080 [J]
2020-01-29 05:44:30
31.28.119.147 attackspam
Invalid user home from 31.28.119.147 port 42052
2020-01-29 05:45:39
179.111.86.90 attack
Unauthorized connection attempt detected from IP address 179.111.86.90 to port 23 [J]
2020-01-29 05:40:53
1.199.152.107 attackbotsspam
Unauthorized connection attempt detected from IP address 1.199.152.107 to port 2220 [J]
2020-01-29 05:36:53
176.113.161.45 attack
Unauthorized connection attempt detected from IP address 176.113.161.45 to port 2323 [J]
2020-01-29 05:53:17
99.183.144.132 attackbotsspam
Unauthorized connection attempt detected from IP address 99.183.144.132 to port 2220 [J]
2020-01-29 05:43:51
222.186.15.158 attack
SSH Brute Force, server-1 sshd[3338]: Failed password for root from 222.186.15.158 port 52148 ssh2
2020-01-29 05:47:33
49.233.172.108 attackbots
Unauthorized connection attempt detected from IP address 49.233.172.108 to port 2220 [J]
2020-01-29 06:01:53
123.134.206.20 attack
Unauthorized connection attempt detected from IP address 123.134.206.20 to port 23 [J]
2020-01-29 05:42:55
182.30.40.65 attackbotsspam
Unauthorized connection attempt detected from IP address 182.30.40.65 to port 23 [J]
2020-01-29 05:40:29
200.53.20.207 attack
Unauthorized connection attempt detected from IP address 200.53.20.207 to port 8080 [J]
2020-01-29 05:38:32
178.94.8.29 attackbotsspam
Unauthorized connection attempt detected from IP address 178.94.8.29 to port 23 [J]
2020-01-29 05:52:36
51.38.137.124 attackspam
Apr 19 00:32:31 ubuntu sshd[31055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.137.124
Apr 19 00:32:33 ubuntu sshd[31055]: Failed password for invalid user servers from 51.38.137.124 port 44210 ssh2
Apr 19 00:38:06 ubuntu sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.137.124
2020-01-29 06:01:38
116.111.85.26 attackspam
Unauthorized connection attempt detected from IP address 116.111.85.26 to port 3389 [J]
2020-01-29 05:43:38

Recently Reported IPs

173.13.248.110 16.233.133.66 70.123.78.148 167.149.177.137
16.98.237.103 15.222.82.174 174.204.38.174 118.91.250.44
193.137.113.201 120.17.163.26 139.23.75.34 180.35.90.201
127.152.66.46 60.113.87.132 145.147.202.15 131.113.226.172
127.140.254.204 43.148.3.93 244.192.84.185 149.16.169.219