Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.42.49.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.42.49.249.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030702 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 13:30:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 249.49.42.61.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.49.42.61.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.240.94.9 attack
spam
2020-08-25 19:24:18
61.177.172.54 attackspam
Aug 25 07:12:55 NPSTNNYC01T sshd[12589]: Failed password for root from 61.177.172.54 port 31026 ssh2
Aug 25 07:13:09 NPSTNNYC01T sshd[12589]: error: maximum authentication attempts exceeded for root from 61.177.172.54 port 31026 ssh2 [preauth]
Aug 25 07:13:14 NPSTNNYC01T sshd[12639]: Failed password for root from 61.177.172.54 port 61602 ssh2
...
2020-08-25 19:22:22
95.172.44.186 attackbots
spam
2020-08-25 19:35:00
62.122.201.241 attackspambots
spam
2020-08-25 19:12:33
195.177.74.142 attackspam
1598327349 - 08/25/2020 10:49:09 Host: interline-aero.voks.ua/195.177.74.142 Port: 8080 TCP Blocked
...
2020-08-25 19:33:40
62.122.201.170 attack
spam
2020-08-25 19:42:17
60.22.49.159 attackbots
 TCP (SYN) 60.22.49.159:39505 -> port 8080, len 40
2020-08-25 19:28:42
193.228.91.108 attackbotsspam
 TCP (SYN) 193.228.91.108:40800 -> port 22, len 44
2020-08-25 19:44:05
103.36.125.162 attackspambots
spam
2020-08-25 19:34:43
58.249.55.68 attackspam
Invalid user carbon from 58.249.55.68 port 41068
2020-08-25 19:30:08
151.80.42.89 attack
Hits on port : 3389
2020-08-25 19:46:30
185.170.114.25 attackbotsspam
Aug 25 04:21:46 vps46666688 sshd[22863]: Failed password for root from 185.170.114.25 port 46029 ssh2
Aug 25 04:21:48 vps46666688 sshd[22863]: Failed password for root from 185.170.114.25 port 46029 ssh2
...
2020-08-25 19:04:45
91.207.40.45 attack
Time:     Tue Aug 25 09:37:40 2020 +0000
IP:       91.207.40.45 (RU/Russia/45.netcom-e.ru)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 25 09:24:14 ca-1-ams1 sshd[23068]: Invalid user tonmx from 91.207.40.45 port 33126
Aug 25 09:24:17 ca-1-ams1 sshd[23068]: Failed password for invalid user tonmx from 91.207.40.45 port 33126 ssh2
Aug 25 09:33:37 ca-1-ams1 sshd[23402]: Invalid user pedro from 91.207.40.45 port 40472
Aug 25 09:33:39 ca-1-ams1 sshd[23402]: Failed password for invalid user pedro from 91.207.40.45 port 40472 ssh2
Aug 25 09:37:38 ca-1-ams1 sshd[23509]: Invalid user pruebas from 91.207.40.45 port 48008
2020-08-25 19:21:49
82.208.133.133 attackspambots
Invalid user bob from 82.208.133.133 port 59526
2020-08-25 19:26:53
97.90.49.141 attack
spam
2020-08-25 19:39:37

Recently Reported IPs

243.98.225.205 118.112.208.101 18.64.78.46 97.114.3.27
144.82.47.189 196.66.126.158 65.251.130.94 69.98.139.215
32.189.235.184 135.238.112.221 249.134.131.89 159.162.197.159
116.15.227.154 38.243.95.33 198.153.16.156 157.79.76.83
63.123.169.73 42.62.125.14 41.128.148.131 253.249.94.25