Summary
IP address 239.255.255.250 is used for IP multicast, which is a technology for efficiently sending the same content to multiple destinations.
1
It is commonly used for distributing financial information and video streams.
1
Additionally, newer versions of Windows are using 239.255.255.250 as a sort of broadcast address to announce the presence of a machine on the network.
2
According to
See more results on Neeva
Summaries from the best pages on the web
Whois IP Lookup for 239.255.255.250 . Shared Hosting. Linux Shared Hosting Fully featured Linux plans with cPanel, Perl, PHP and more Starts at just | $1.68/mo; Windows Shared Hosting Complete Windows…
Whois IP 239.255.255.250
whois.com
224.0.0.0 through 239.255.255.255. Address assignments are listed below. The range of addresses between 224.0.0.0 and 224.0.0.255, inclusive, is reserved for the use of routing protocols and other low-level topology discovery…
PLease help, going crazy! IP 239.255.255.250 over and over
sevenforums.com
IP Abuse Reports for 239.255.255.250 : . This IP address has been reported a total of 24 times from 18 distinct sources. 239.255.255.250 was first reported on January 26th 2021, and…
239.255.255.250 | Multicast | AbuseIPDB
abuseipdb.com
Hi malware fighters, If sniffing my traffic I see packets sent to 239.255.255.250 . SSDP Method = M-SEARCH SSDP Uniform Resource Identifier =. ' SSDP HTTP Prot Version = HTTP/1.1. SSDP…
Why packets to 239.255.255.250: 1900 - Avast
avast.com
SRW / SGE switches are sending packets like this below: IP 172.16.57.100.1900 > 239.255.255.250 .1900: UDP, length 296 IP 172.16.57.100.1900 > 239.255.255.250 .1900: UDP, length 313 (a discovery message to the multicast…
how to stop srw/sge sending 239.255.255.250.1900: UDP
cisco.com
The SSDP protocol can discover Plug & Play devices, with uPnP (Universal Plug and Play). SSDP uses unicast and multicast adress (239.255.255.250). SSDP is HTTP like protocol and work with…
SSDP - Wireshark
wireshark.org
A packet was dropped because Forefront TMG determined that the source IP address is spoofed. Rule: None - see Result Code Source: Perimeter (192.168.2.203:1900) Destination: Perimeter (239.255.255.250:1900) Protocol: UDP 1900.…
UDP 1900 to 239.255.255.250 denied as spoofed
microsoft.com