Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.34.231.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;249.34.231.121.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121001 1800 900 604800 86400

;; Query time: 137 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 04:46:24 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 121.231.34.249.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.231.34.249.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.202.42.70 attackbots
kidness.family 144.202.42.70 [07/Jan/2020:20:08:48 +0100] "POST /wp-login.php HTTP/1.1" 200 6279 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
kidness.family 144.202.42.70 [07/Jan/2020:20:08:49 +0100] "POST /xmlrpc.php HTTP/1.1" 200 4055 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-01-08 03:18:13
198.108.67.32 attackspambots
firewall-block, port(s): 885/tcp
2020-01-08 03:22:55
58.218.209.239 attackbotsspam
Unauthorized connection attempt detected from IP address 58.218.209.239 to port 2220 [J]
2020-01-08 03:15:26
162.144.141.141 attackspambots
Automatic report - Banned IP Access
2020-01-08 03:09:55
124.127.133.158 attackspambots
Jan  7 20:20:50 legacy sshd[28810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.133.158
Jan  7 20:20:51 legacy sshd[28810]: Failed password for invalid user teamspeak3 from 124.127.133.158 port 34618 ssh2
Jan  7 20:23:39 legacy sshd[28915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.133.158
...
2020-01-08 03:29:22
45.136.108.116 attack
Jan  7 17:29:07 h2177944 kernel: \[1613088.394056\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=55883 PROTO=TCP SPT=59518 DPT=9010 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  7 17:29:07 h2177944 kernel: \[1613088.394068\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=55883 PROTO=TCP SPT=59518 DPT=9010 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  7 17:31:54 h2177944 kernel: \[1613255.809301\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=49188 PROTO=TCP SPT=59518 DPT=4535 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  7 17:31:54 h2177944 kernel: \[1613255.809314\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=49188 PROTO=TCP SPT=59518 DPT=4535 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  7 18:02:19 h2177944 kernel: \[1615080.186859\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.116 DST=85.214.
2020-01-08 03:05:12
61.19.27.253 attackspam
SSH bruteforce
2020-01-08 03:41:06
49.233.135.204 attackbotsspam
Unauthorized connection attempt detected from IP address 49.233.135.204 to port 2220 [J]
2020-01-08 03:14:54
189.114.252.148 attackbotsspam
Unauthorised access (Jan  7) SRC=189.114.252.148 LEN=48 TTL=112 ID=28717 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-08 03:40:12
149.202.84.141 attackspambots
SIP registrations and call attempts
2020-01-08 03:35:17
92.118.38.39 attackbots
Jan  7 20:02:43 vmanager6029 postfix/smtpd\[5401\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 20:03:15 vmanager6029 postfix/smtpd\[5379\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-08 03:07:10
68.183.110.49 attack
Unauthorized connection attempt detected from IP address 68.183.110.49 to port 2220 [J]
2020-01-08 03:23:46
185.153.199.144 attack
RDP brute forcing (r)
2020-01-08 03:42:23
213.138.73.250 attackspam
Unauthorized connection attempt detected from IP address 213.138.73.250 to port 2220 [J]
2020-01-08 03:32:16
177.10.218.164 attack
1578401822 - 01/07/2020 13:57:02 Host: 177.10.218.164/177.10.218.164 Port: 445 TCP Blocked
2020-01-08 03:08:12

Recently Reported IPs

56.209.214.40 71.82.30.45 189.255.54.245 233.116.75.111
174.43.30.97 126.232.6.49 207.36.85.59 42.220.96.168
215.8.230.185 27.93.148.33 42.205.67.223 205.115.149.151
125.5.216.150 160.28.228.255 117.160.146.140 30.137.77.252
140.167.234.183 113.59.115.253 61.20.114.22 219.107.58.145