Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.249.219.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24801
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.249.219.2.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:09:08 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 2.219.249.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.219.249.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.85.132.27 attackspambots
Jul 15 17:00:42 prod4 sshd\[22219\]: Invalid user 2019 from 40.85.132.27
Jul 15 17:00:42 prod4 sshd\[22220\]: Invalid user fontainepicard from 40.85.132.27
Jul 15 17:00:42 prod4 sshd\[22221\]: Invalid user 2019.fontainepicard.com from 40.85.132.27
...
2020-07-15 23:53:55
92.242.207.18 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-15 23:29:31
40.85.215.178 attackbots
Jul 15 11:31:49 mail sshd\[42967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.85.215.178  user=root
...
2020-07-15 23:49:53
46.38.150.191 attackspam
Jul 15 17:36:50 srv01 postfix/smtpd\[9170\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 17:37:07 srv01 postfix/smtpd\[2656\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 17:37:17 srv01 postfix/smtpd\[9171\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 17:37:23 srv01 postfix/smtpd\[9170\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 17:37:47 srv01 postfix/smtpd\[9595\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-15 23:38:58
187.16.108.154 attackbotsspam
Jul 15 16:39:23 piServer sshd[26075]: Failed password for irc from 187.16.108.154 port 48928 ssh2
Jul 15 16:49:01 piServer sshd[27480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.108.154 
Jul 15 16:49:04 piServer sshd[27480]: Failed password for invalid user snow from 187.16.108.154 port 52334 ssh2
...
2020-07-15 23:44:54
125.124.134.220 attack
Port probing on unauthorized port 30356
2020-07-15 23:49:14
118.36.234.144 attack
Jul 15 14:31:58 XXX sshd[2246]: Invalid user www-data from 118.36.234.144 port 53183
2020-07-15 23:49:33
137.116.144.81 attackbots
Jul 15 17:59:22 hosting sshd[2307]: Invalid user remuar.ru from 137.116.144.81 port 31019
Jul 15 17:59:22 hosting sshd[2308]: Invalid user remuar from 137.116.144.81 port 31018
Jul 15 17:59:22 hosting sshd[2308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.144.81
Jul 15 17:59:22 hosting sshd[2308]: Invalid user remuar from 137.116.144.81 port 31018
Jul 15 17:59:25 hosting sshd[2308]: Failed password for invalid user remuar from 137.116.144.81 port 31018 ssh2
Jul 15 17:59:22 hosting sshd[2307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.144.81
Jul 15 17:59:22 hosting sshd[2307]: Invalid user remuar.ru from 137.116.144.81 port 31019
Jul 15 17:59:25 hosting sshd[2307]: Failed password for invalid user remuar.ru from 137.116.144.81 port 31019 ssh2
...
2020-07-15 23:27:09
51.77.213.136 attackbots
Failed password for invalid user lyg from 51.77.213.136 port 35532 ssh2
2020-07-15 23:38:28
222.190.130.62 attackspam
Icarus honeypot on github
2020-07-15 23:31:56
110.35.80.82 attackbots
Brute-force attempt banned
2020-07-16 00:08:53
52.163.121.141 attack
Jul 14 07:14:52 josie sshd[31446]: Invalid user josie from 52.163.121.141
Jul 14 07:14:52 josie sshd[31447]: Invalid user josie from 52.163.121.141
Jul 14 07:14:52 josie sshd[31447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.121.141 
Jul 14 07:14:52 josie sshd[31446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.121.141 
Jul 14 07:14:52 josie sshd[31451]: Invalid user josie from 52.163.121.141
Jul 14 07:14:52 josie sshd[31450]: Invalid user jabarchives from 52.163.121.141
Jul 14 07:14:52 josie sshd[31454]: Invalid user josie.jabarchives.com from 52.163.121.141
Jul 14 07:14:52 josie sshd[31452]: Invalid user jabarchives from 52.163.121.141
Jul 14 07:14:52 josie sshd[31453]: Invalid user jabarchives from 52.163.121.141
Jul 14 07:14:52 josie sshd[31455]: Invalid user jabarchives from 52.163.121.141
Jul 14 07:14:52 josie sshd[31456]: Invalid user josie from 52.163.121.141
........
-------------------------------
2020-07-15 23:59:44
113.252.208.7 attackbotsspam
Jul 15 14:22:47 raspberrypi sshd\[23256\]: Invalid user orangepi from 113.252.208.7 port 43938
Jul 15 14:23:08 raspberrypi sshd\[23314\]: Invalid user orangepi from 113.252.208.7 port 44034
Jul 15 14:23:25 raspberrypi sshd\[23368\]: Invalid user orangepi from 113.252.208.7 port 44166
...
2020-07-15 23:38:13
155.4.117.13 attackbotsspam
(mod_security) mod_security (id:218420) triggered by 155.4.117.13 (SE/Sweden/h-117-13.A785.priv.bahnhof.se): 5 in the last 3600 secs
2020-07-15 23:58:40
158.58.197.227 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-07-15 23:42:37

Recently Reported IPs

44.247.172.81 202.209.24.179 154.96.1.42 139.83.205.113
218.218.189.220 126.84.42.6 115.144.152.216 209.97.7.115
136.16.85.254 159.93.225.105 242.159.215.125 130.181.31.66
22.52.188.235 39.143.107.246 65.10.230.102 166.42.129.140
49.3.46.118 33.254.200.69 196.152.121.67 116.73.237.11