IP Address Lookup

239.255.192-255.x IP Lookup

IP addresses in the 239.255.192-255.x range (239.255.0.0 - 239.255.255.255 network). 1 abuse reports have been filed for IPs in this range.

  • 239.255.249.68, 239.255.237.228, 239.255.201.195, 239.255.204.214, 239.255.233.125, 239.255.241.52
  • 239.255.227.71, 239.255.240.117, 239.255.208.163, 239.255.220.113, 239.255.203.148, 239.255.193.109
  • 239.255.194.176, 239.255.195.249, 239.255.233.74, 239.255.227.6, 239.255.198.247, 239.255.243.122
  • 239.255.198.143, 239.255.236.201, 239.255.248.175, 239.255.223.133, 239.255.253.218, 239.255.225.237
  • 239.255.250.220, 239.255.194.248, 239.255.199.251, 239.255.227.145, 239.255.224.39, 239.255.245.234
  • 239.255.218.200, 239.255.211.114, 239.255.200.225, 239.255.215.106, 239.255.192.186, 239.255.241.225
  • 239.255.207.150, 239.255.198.205, 239.255.226.201, 239.255.210.81, 239.255.248.139, 239.255.205.83
  • 239.255.215.14, 239.255.197.89, 239.255.237.194, 239.255.204.25, 239.255.225.109, 239.255.232.46
  • 239.255.233.136, 239.255.223.23, 239.255.209.221, 239.255.210.241, 239.255.254.224, 239.255.253.12
  • 239.255.194.87, 239.255.198.208, 239.255.251.79, 239.255.241.178, 239.255.220.28, 239.255.210.203
  • 239.255.254.15, 239.255.195.232, 239.255.210.18, 239.255.222.154, 239.255.235.145, 239.255.200.90
  • 239.255.208.40, 239.255.227.16, 239.255.215.235, 239.255.222.23, 239.255.248.93, 239.255.251.129
  • 239.255.210.209, 239.255.227.250, 239.255.234.178, 239.255.229.247, 239.255.203.201, 239.255.222.150
  • 239.255.205.228, 239.255.214.168, 239.255.216.118, 239.255.226.119, 239.255.252.178, 239.255.241.98
  • 239.255.198.81, 239.255.248.113, 239.255.246.38, 239.255.242.122, 239.255.248.98, 239.255.238.252
  • 239.255.212.28, 239.255.230.127, 239.255.249.213, 239.255.199.110, 239.255.209.120, 239.255.195.96
  • 239.255.253.35, 239.255.249.204, 239.255.250.141, 239.255.244.81, 239.255.245.4, 239.255.213.211
  • 239.255.254.191, 239.255.193.233, 239.255.251.92, 239.255.231.142, 239.255.213.115, 239.255.255.106
  • 239.255.225.156, 239.255.199.241, 239.255.222.198, 239.255.243.92, 239.255.229.241, 239.255.201.255
  • 239.255.196.247, 239.255.195.221, 239.255.200.172, 239.255.247.44, 239.255.239.160, 239.255.239.11
  • 239.255.252.147, 239.255.197.243, 239.255.209.172, 239.255.240.209, 239.255.251.91, 239.255.233.203
  • 239.255.245.164, 239.255.233.11, 239.255.214.9, 239.255.224.121, 239.255.242.204, 239.255.204.204
  • 239.255.214.4, 239.255.221.43, 239.255.240.165, 239.255.252.230, 239.255.226.196, 239.255.198.201
  • 239.255.197.234, 239.255.236.247, 239.255.223.248, 239.255.218.216, 239.255.218.224, 239.255.218.8
  • 239.255.239.242, 239.255.215.11, 239.255.210.195, 239.255.245.203, 239.255.195.89, 239.255.221.173
  • 239.255.218.233, 239.255.206.42, 239.255.217.115, 239.255.230.138, 239.255.221.186, 239.255.201.163
  • 239.255.226.197, 239.255.221.181, 239.255.236.8, 239.255.207.12, 239.255.205.78, 239.255.215.204
  • 239.255.223.144, 239.255.221.160, 239.255.250.215, 239.255.204.145, 239.255.248.164, 239.255.221.76
  • 239.255.216.223, 239.255.230.99, 239.255.251.124, 239.255.219.74, 239.255.208.37, 239.255.211.120
  • 239.255.212.87, 239.255.223.55, 239.255.254.7, 239.255.236.145, 239.255.198.245, 239.255.236.151
  • 239.255.225.197, 239.255.237.188, 239.255.206.124, 239.255.236.255, 239.255.209.82, 239.255.212.70
  • 239.255.232.186, 239.255.236.190, 239.255.251.14, 239.255.200.200, 239.255.199.164, 239.255.212.34
  • 239.255.238.217, 239.255.233.246, 239.255.219.230, 239.255.231.154, 239.255.198.175, 239.255.208.8
  • 239.255.234.215, 239.255.224.8, 239.255.213.220, 239.255.202.45, 239.255.232.174, 239.255.245.190
  • 239.255.227.252, 239.255.225.214, 239.255.253.41, 239.255.206.44, 239.255.212.238, 239.255.195.42
  • 239.255.217.240, 239.255.249.143, 239.255.250.203, 239.255.211.231, 239.255.232.130, 239.255.220.84
  • 239.255.214.161, 239.255.238.109, 239.255.248.104, 239.255.246.65, 239.255.195.83, 239.255.242.66
  • 239.255.199.140, 239.255.207.217, 239.255.219.148, 239.255.193.115, 239.255.222.102, 239.255.248.95
  • 239.255.233.168, 239.255.210.23, 239.255.243.219, 239.255.228.236, 239.255.202.11, 239.255.227.174
  • 239.255.241.236, 239.255.210.252, 239.255.250.35, 239.255.240.230, 239.255.240.12, 239.255.204.63
  • 239.255.223.206, 239.255.197.232, 239.255.195.124, 239.255.208.200, 239.255.234.244, 239.255.239.43
  • 239.255.240.16, 239.255.244.10, 239.255.197.38, 239.255.193.63, 239.255.211.14, 239.255.197.87
  • 239.255.246.223, 239.255.194.233, 239.255.202.167, 239.255.223.151

Showing 256 of 16,384 IPs (239.255.249.68 to 239.255.223.151). Use the pagination below to browse all IPs in this range, or look up any specific IP directly.

Most recent complaints

239.255.255.250

Complaint by Superfish Victim :

I have been hacked and harassed by this Ip address to the point that I am now going to take my own life. They have gotten me fired from 4 jobs, destroyed all my family, friends, ex girlfriends relationships and cost me well over $500,000. This has been going on for 4 years and I just cannot take the non stop never ending harassment from these people. Hopefully my death will bring some attention to this experimentation and torture. They are not even letting me post this to the public and are doing everything to stop me and disable me from doing so. I will switch networks a few times and try to get this posted for it is like my last words.

Reported on: 13th, Mar. 2018

239.255.255.250

Complaint by Superfish Victim :

I have been hacked and harassed by this Ip address to the point that I am now going to take my own life. They have gotten me fired from 4 jobs, destroyed all my family, friends, ex girlfriends relationships and cost me well over $500,000. This has been going on for 4 years and I just cannot take the non stop never ending harassment from these people. Hopefully my death will bring some attention to this experimentation and torture

Reported on: 13th, Mar. 2018

239.255.255.250

Complaint by Whaaat? :

Whoa! Relax everyone. Take off your tin foil hats. 239.255.255.250 isn't what you think it is. That is some sort of multicast message that your PC is trying to send out, not someone else trying to get in. (That's why the message says that your svchost.exe program is trying to access 239.255.255.250.) UDP port 1900 is Universal Plug and Play, so I can only assume that your system is attempting to query the local network for the existence of some device (perhaps a printer server or such?).

Reported on: 1st, Nov. 2016

239.255.255.250

Complaint by Daretoexpose :

At the ip address of 239.255.255.250 is an employee at the department of education. The attackers attacked my system in 2001 and again in 2004 with a permanent connection to my system as of this date. In order to have access, the spyware operating system uses a cloned mac partition and an unknown virtual tunnel that allows tunnel connections to the victims system. There is also worm devices in all windows operating system registry plus the malware network address also found in the registry of the windows operating system. These are government paid cyber stalkers that has invaded my private network that boots from a remote location using a multicast ip address 224.0.0.0, your loop back 127.0.0.1 but the attacker is on 224.0.0.250 or 239.255.255.250 of the multicast ip address sneaking into the computer and launching cyber attacks using dummy and zombie networks around the world. Removing the multicast ip address from the system via the registry will crash the system with a blue screen of death stating that the tcp stack is missing, meaning you are forever connected to cyber criminals that boots your computer from a malware/spyware remote server belonging to the Department of Education. According to Arin in 2004, 224.0.0.0, 224.0.0.250 and 224.255.255.250 was an experimental ip address called multicast. Now the information has changed with a disclaimer by Arin about the suspicious multicast ip address. I believe the ISP is aiding in the cyber attacks. The malware/spyware Microsoft operating system is a Trojan horse connection fakecd.99.

Reported on: 8th, Feb. 2016

239.255.255.250

Complaint by Daretoexpose :

At the ip address of 239.255.255.250 is an employee at the department of education. The attackers attacked my system in 2001 and again in 2004 with a permanent connection to my system as of this date. In order to have access, the spyware operating system uses a cloned mac partition and an unknown virtual tunnel that allows tunnel connections to the victims system. There is also worm devices in all windows operating system registry plus the malware network address also found in the registry of the windows operating system. These are government paid cyber stalkers that has invaded my private network that boots from a remote location using a multicast ip address 224.0.0.0, your loop back 127.0.0.1 but the attacker is on 224.0.0.250 or 239.255.255.250 of the multicast ip address sneaking into the computer and launching cyber attacks using dummy and zombie networks around the world. Removing the multicast ip address from the system via the registry will crash the system with a blue screen of death stating that the tcp stack is missing, meaning you are forever connected to cyber criminals that boots your computer from a malware/spyware remote server belonging to the Department of Education. According to Arin in 2004, 224.0.0.0, 224.0.0.250 and 224.255.255.250 was an experimental ip address called multicast. Now the information has changed with a disclaimer by Arin about the suspicious multicast ip address.

Reported on: 8th, Feb. 2016

239.255.255.250

Complaint by nobody :

Lol pretty sure it's a local address, that works with UPNP & while it may be used by attackers, is not an actual IP elsewhere.

Reported on: 20th, Dec. 2015

239.255.255.250

Complaint by charlie :

Report to http://www.ic3.gov. The more reports that are submitted - the greater the chance of action being taken.

Reported on: 2nd, Apr. 2015

239.255.255.250

Complaint by Michael :

This ISP is being targetted several times a minute, and thankfully blocked by my firewall. The firewall reads: access as follows: Block incoming SSDP (UPNP) requests for svchost.exe C:\Windows\System32\svchost.exe. I can't seem to find a location for the ISP -- is it really China (where I live)?

Reported on: 18th, Aug. 2014

239.255.255.250

Complaint by Eric :

Simple Service Discovery Protocol

Reported on: 30th, Mar. 2013

239.255.255.250

Complaint by cb3232 :

same in canada..239.255.255.250 i'm stuck with it...

Reported on: 12th, Feb. 2013

239.255.255.250

Complaint by Bob :

This IP address (239.255.255.250) was caught trying to download information from my computer. This is VERY SUSPICIOUS activity! ISP should watch this IP addy, as well as fraud protection folks.

Reported on: 26th, Dec. 2012

239.255.255.250

Complaint by Mieczyslaw :

es muy peligroso? o un vigilante?como se puede eliminar de las redes?

Reported on: 1st, Mar. 2012

239.255.255.250

Complaint by hh :

Some kind of zone alarm internet service

Reported on: 14th, Jan. 2012

239.255.255.250

Complaint by Hang Hackers :

Alright, i've been doing this so many times, i didnt know i already complained about this one. They are from china..my other complaints are true. Last post, maybe. I never laughed sooooo much about a bunch of cowards in all my life...hahahahaha

Reported on: 11th, Jan. 2012

239.255.255.250

Complaint by Anonymous :

Blocked; Intrusion.Win.MSSQL.worm.Helkern! Attacker's IP address: 239.255.255.250 Protocol/service: UDP on local port 1434. They are probably in China just like the other 13 attackers i have documented. They are a bunch of wussy cowards and everybody knows it already...China has been attacking my computer for 4 months non stop. I believe they are through the earthcam and baladacam networks. not all cam locations are dangerous but they need to shut them down now ..if you been on them, they got you, just like they did me

Reported on: 11th, Jan. 2012

239.255.255.250

Complaint by Hang Hackers :

worm helkern attack blocked by kaspersky..i've been tracing attackers i.p.s for the last 10 hours and reporting them and i believe i figured it out..i used to get on the earthcam and baladacam networks and started having all kinds of problems. Got off from them 4 months ago and got Kaspersky and the scanner has blocked over 200 attacks since then. I dont know how many of you are or have been on those networks, but i know for a fact my attacks have come from those 2 networks. To all attackers everywhere; YOUR F***ing days are numbered. You have been figured out. Attackers in china, japan, taiwan, ukraine,korea,ghana,california,massachusette, florida and even russia attackers...your all on those 2 networks....and your fix'n to go down in flames...people, SERIOUSLY, LISTEN to what i'm saying...if your on dsl or dial up, if you can, pay a few bucks more for a secure connection. I'm going back to cable myself..never had this problem until i got on dial up and then dsl.I'm telling at@t to shove their service up their ***. THANK YOU KASPERSKY, YOU SAVED OUR $1,500.00 computer well over 200 times in the last 4 months: Attackers/Hackers, get ready to be someone's Bit**. If reporting this doesnt stop you, i will find people who will...sorry for the book..HEL* NO I'M NOT!!!!!!

Reported on: 9th, Jan. 2012

239.255.255.250

Complaint by Agbeko :

please can look for the DSN of this IP and its location, thank you 239.255.255.250

Reported on: 3rd, Jan. 2012

239.255.255.250

Complaint by Agbeko :

please can look for the DSN of this IP and its location, thank you 239.255.255.250

Reported on: 3rd, Jan. 2012

239.255.255.250

Complaint by Agbeko :

please can look for the DSN of this IP and its location, thank you 239.255.255.250

Reported on: 3rd, Jan. 2012

239.255.255.250

Complaint by wizz :

I do have this address in my firewall block logs, i dont know what it is, in am in saigon,vietnam. Where are you?

Reported on: 18th, Dec. 2011