Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.85.97.4 attack
Unauthorized connection attempt detected from IP address 49.85.97.4 to port 6656 [T]
2020-01-30 17:09:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.85.97.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.85.97.249.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061501 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 02:44:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 249.97.85.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.97.85.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.247.109.100 attack
*Port Scan* detected from 77.247.109.100 (NL/Netherlands/-). 4 hits in the last 155 seconds
2020-01-29 05:59:43
59.72.112.21 attackspam
Unauthorized connection attempt detected from IP address 59.72.112.21 to port 2220 [J]
2020-01-29 06:00:55
197.39.137.166 attackbots
Unauthorized connection attempt detected from IP address 197.39.137.166 to port 23 [J]
2020-01-29 06:32:25
83.17.166.241 attackbots
Unauthorized connection attempt detected from IP address 83.17.166.241 to port 2220 [J]
2020-01-29 06:25:22
36.90.152.196 attackbots
Unauthorized connection attempt detected from IP address 36.90.152.196 to port 80 [J]
2020-01-29 06:28:59
45.55.84.16 attackbotsspam
Unauthorized connection attempt detected from IP address 45.55.84.16 to port 2220 [J]
2020-01-29 06:15:07
185.173.35.25 attack
Unauthorized connection attempt detected from IP address 185.173.35.25 to port 138 [J]
2020-01-29 06:35:00
79.21.119.222 attackspambots
Unauthorized connection attempt detected from IP address 79.21.119.222 to port 23 [J]
2020-01-29 06:13:33
179.187.194.146 attackbotsspam
Unauthorized connection attempt detected from IP address 179.187.194.146 to port 23 [J]
2020-01-29 06:35:15
156.203.99.17 attackbots
Unauthorized connection attempt detected from IP address 156.203.99.17 to port 23 [J]
2020-01-29 06:38:03
77.234.69.177 attack
Unauthorized connection attempt detected from IP address 77.234.69.177 to port 23 [J]
2020-01-29 06:26:34
111.205.178.39 attackspam
Unauthorized connection attempt detected from IP address 111.205.178.39 to port 1433 [J]
2020-01-29 06:09:16
149.202.56.194 attack
Unauthorized connection attempt detected from IP address 149.202.56.194 to port 2220 [J]
2020-01-29 06:39:11
139.59.87.250 attackspam
Jan 28 22:58:34 ovpn sshd\[17046\]: Invalid user ameya from 139.59.87.250
Jan 28 22:58:34 ovpn sshd\[17046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.87.250
Jan 28 22:58:36 ovpn sshd\[17046\]: Failed password for invalid user ameya from 139.59.87.250 port 59474 ssh2
Jan 28 23:16:01 ovpn sshd\[21434\]: Invalid user manideepa from 139.59.87.250
Jan 28 23:16:01 ovpn sshd\[21434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.87.250
2020-01-29 06:39:47
31.208.74.177 attackbots
Unauthorized connection attempt detected from IP address 31.208.74.177 to port 22 [J]
2020-01-29 06:29:17

Recently Reported IPs

49.85.98.241 49.85.98.184 49.85.99.47 49.85.99.170
49.85.111.29 49.85.99.228 49.85.162.44 45.32.153.249
78.48.47.180 45.12.30.166 78.61.208.189 78.60.172.37
78.60.136.4 49.85.51.83 78.61.163.137 45.32.145.101
78.63.240.135 49.85.52.182 49.85.53.240 49.85.53.93