Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.85.244.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.85.244.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:51:45 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 239.244.85.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.244.85.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.155.249.80 attackspam
5555/tcp
[2020-10-03]1pkt
2020-10-04 15:22:52
79.222.246.46 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: p4fdef62e.dip0.t-ipconnect.de.
2020-10-04 15:21:00
177.124.10.29 attack
445/tcp 1433/tcp...
[2020-09-26/10-02]4pkt,2pt.(tcp)
2020-10-04 15:02:51
139.162.170.48 attackspambots
11211/tcp 3388/tcp 631/tcp...
[2020-08-08/10-03]9pkt,9pt.(tcp)
2020-10-04 14:53:28
180.76.168.54 attackbots
Invalid user ogpbot from 180.76.168.54 port 58398
2020-10-04 15:25:40
190.203.88.235 attack
445/tcp
[2020-10-03]1pkt
2020-10-04 15:33:39
35.204.152.99 attackbots
35.204.152.99 is unauthorized and has been banned by fail2ban
2020-10-04 15:27:42
112.85.42.117 attackspam
Oct  4 08:54:08 pve1 sshd[24199]: Failed password for root from 112.85.42.117 port 27820 ssh2
Oct  4 08:54:13 pve1 sshd[24199]: Failed password for root from 112.85.42.117 port 27820 ssh2
...
2020-10-04 14:55:56
43.226.26.186 attackbots
SSH login attempts.
2020-10-04 15:36:37
107.77.202.13 attackbots
Chat Spam
2020-10-04 15:08:27
175.143.86.250 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-10-04 15:14:15
104.236.55.217 attackspambots
 TCP (SYN) 104.236.55.217:46138 -> port 13094, len 44
2020-10-04 15:12:06
217.160.25.39 attack
Brute forcing email accounts
2020-10-04 14:54:27
35.239.143.173 attack
IP already banned
2020-10-04 15:15:25
45.142.120.149 attackspambots
Oct  4 09:13:04 srv01 postfix/smtpd\[29099\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 09:13:14 srv01 postfix/smtpd\[25052\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 09:13:16 srv01 postfix/smtpd\[29105\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 09:13:17 srv01 postfix/smtpd\[25051\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 09:13:20 srv01 postfix/smtpd\[29491\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-04 15:24:22

Recently Reported IPs

5.173.1.37 193.198.21.181 238.48.119.211 235.215.221.211
238.60.137.27 178.190.222.246 138.131.91.214 147.238.156.202
235.73.41.11 209.180.137.95 181.144.4.117 200.79.9.246
193.221.179.9 129.240.49.215 152.63.168.79 151.67.239.49
193.134.156.142 2.30.206.148 167.104.169.94 72.185.83.235