Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.242.94.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;71.242.94.49.			IN	A

;; AUTHORITY SECTION:
.			365	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092401 1800 900 604800 86400

;; Query time: 392 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 25 03:22:57 CST 2019
;; MSG SIZE  rcvd: 116
Host info
49.94.242.71.in-addr.arpa domain name pointer pool-71-242-94-49.phlapa.btas.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.94.242.71.in-addr.arpa	name = pool-71-242-94-49.phlapa.btas.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.33.226.118 attack
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-09-01 20:17:03
36.72.56.97 attackbots
Attempted connection to port 445.
2020-09-01 20:18:25
91.211.195.27 attackbots
[portscan] Port scan
2020-09-01 20:15:48
117.4.162.39 attack
Attempted connection to port 445.
2020-09-01 20:26:52
117.4.11.161 attackbotsspam
Port Scan
...
2020-09-01 20:31:19
51.178.215.200 attackspambots
22/tcp
[2020-09-01]1pkt
2020-09-01 20:16:12
216.228.104.36 attackspambots
445/tcp 1433/tcp...
[2020-08-09/09-01]5pkt,2pt.(tcp)
2020-09-01 20:13:41
163.172.40.236 attackbots
163.172.40.236 - - [01/Sep/2020:16:14:11 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-09-01 20:14:22
141.101.99.211 attackspam
srv02 DDoS Malware Target(80:http) ..
2020-09-01 20:45:23
123.17.153.45 attack
Unauthorized connection attempt from IP address 123.17.153.45 on Port 445(SMB)
2020-09-01 20:15:13
118.175.176.164 attack
Unauthorized connection attempt from IP address 118.175.176.164 on Port 445(SMB)
2020-09-01 20:19:44
161.35.140.204 attack
Sep  1 14:35:53 mellenthin sshd[19325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.140.204
Sep  1 14:35:55 mellenthin sshd[19325]: Failed password for invalid user hj from 161.35.140.204 port 36540 ssh2
2020-09-01 20:37:04
113.229.60.208 attack
37215/tcp
[2020-09-01]1pkt
2020-09-01 20:23:43
93.126.33.1 attackspambots
1598963707 - 09/01/2020 14:35:07 Host: 93.126.33.1/93.126.33.1 Port: 23 TCP Blocked
...
2020-09-01 20:46:32
94.57.81.140 attack
20/9/1@08:34:57: FAIL: Alarm-Network address from=94.57.81.140
...
2020-09-01 20:55:59

Recently Reported IPs

129.132.49.78 199.108.15.172 185.222.56.132 94.76.135.102
75.141.116.111 92.80.208.193 180.120.94.247 24.6.67.24
169.130.216.73 86.91.149.224 178.234.129.194 79.71.206.91
221.15.159.219 39.75.198.191 170.72.89.143 114.231.140.63
114.231.136.85 27.59.30.122 86.237.154.70 47.73.111.109