Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.94.111.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.94.111.249.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 08:08:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 249.111.94.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.111.94.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.142.201.98 attackspam
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-02 03:49:38
170.233.96.61 attack
Automatic report - Port Scan Attack
2020-02-02 03:52:55
142.93.140.242 attack
Unauthorized connection attempt detected from IP address 142.93.140.242 to port 2220 [J]
2020-02-02 04:05:55
34.255.158.57 attack
Feb  1 19:44:24 mail postfix/smtpd\[24869\]: warning: unknown\[34.255.158.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb  1 19:44:24 mail postfix/smtpd\[24926\]: warning: unknown\[34.255.158.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb  1 19:44:24 mail postfix/smtpd\[24877\]: warning: unknown\[34.255.158.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb  1 19:44:24 mail postfix/smtpd\[25011\]: warning: unknown\[34.255.158.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-02-02 03:41:21
41.230.218.222 attack
8728/tcp 22/tcp 8291/tcp...
[2020-02-01]4pkt,3pt.(tcp)
2020-02-02 04:02:14
222.89.20.122 attackbotsspam
3389BruteforceStormFW21
2020-02-02 03:54:01
142.93.219.80 attackbots
...
2020-02-02 03:45:34
84.17.46.21 attackbotsspam
(From jayroach@hotmail.co.uk) Аdult onlinе dаting phоnе numbers: http://ypvijdc.tajmahalblacktea.com/6
2020-02-02 03:58:06
178.207.169.171 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 03:52:35
142.93.211.44 attackspam
Unauthorized connection attempt detected from IP address 142.93.211.44 to port 2220 [J]
2020-02-02 03:53:15
42.178.239.167 attackspam
23/tcp
[2020-02-01]1pkt
2020-02-02 03:40:50
142.93.194.241 attack
...
2020-02-02 03:56:30
83.228.97.22 attackspam
Honeypot attack, port: 445, PTR: 83-228-97-22.btc-net.bg.
2020-02-02 04:08:24
151.232.56.134 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-02 03:42:16
172.68.189.129 attackspambots
02/01/2020-17:34:18.360708 172.68.189.129 Protocol: 6 ET WEB_SPECIFIC_APPS [PT OPEN] Drupalgeddon2 <8.3.9 <8.4.6 <8.5.1 RCE Through Registration Form (CVE-2018-7600)
2020-02-02 03:45:15

Recently Reported IPs

27.37.136.197 202.157.238.16 44.248.137.196 233.187.239.92
221.240.109.202 133.154.49.191 195.108.106.187 234.130.5.49
75.177.95.35 191.149.163.120 136.125.211.88 52.226.79.91
148.66.237.85 250.39.122.176 121.159.145.46 188.221.164.182
41.118.13.172 77.71.55.83 226.65.42.237 12.22.234.30