Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Malmo

Region: Skåne

Country: Sweden

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.218.239.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.218.239.249.		IN	A

;; AUTHORITY SECTION:
.			457	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 04:34:20 CST 2019
;; MSG SIZE  rcvd: 119
Host info
249.239.218.194.in-addr.arpa is an alias for 249.240-28.239.218.194.in-addr.arpa.
249.240-28.239.218.194.in-addr.arpa domain name pointer srv9.mgnsnet.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.239.218.194.in-addr.arpa	canonical name = 249.240-28.239.218.194.in-addr.arpa.
249.240-28.239.218.194.in-addr.arpa	name = srv9.mgnsnet.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
102.152.18.0 attackspambots
5500/tcp
[2020-01-31]1pkt
2020-02-01 07:49:46
222.186.175.140 attackbotsspam
Failed password for root from 222.186.175.140 port 29338 ssh2
Failed password for root from 222.186.175.140 port 29338 ssh2
Failed password for root from 222.186.175.140 port 29338 ssh2
Failed password for root from 222.186.175.140 port 29338 ssh2
2020-02-01 07:46:41
77.202.192.113 attack
Invalid user pi from 77.202.192.113 port 56218
2020-02-01 07:46:03
178.63.120.108 attackspambots
port 23
2020-02-01 07:43:45
179.52.9.89 attackspam
Automatic report - Port Scan Attack
2020-02-01 07:49:28
162.243.128.105 attackspam
465/tcp
[2020-01-31]1pkt
2020-02-01 07:50:38
45.238.204.10 attackspambots
23/tcp
[2020-01-31]1pkt
2020-02-01 08:02:45
189.212.98.20 attackspam
Automatic report - Port Scan Attack
2020-02-01 07:57:11
81.4.123.26 attackbotsspam
Unauthorized connection attempt detected from IP address 81.4.123.26 to port 2220 [J]
2020-02-01 08:14:32
82.64.129.178 attack
Unauthorized connection attempt detected from IP address 82.64.129.178 to port 2220 [J]
2020-02-01 07:48:59
222.186.42.155 attack
Feb  1 00:50:48 mail sshd\[31063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Feb  1 00:50:49 mail sshd\[31063\]: Failed password for root from 222.186.42.155 port 24994 ssh2
Feb  1 00:59:27 mail sshd\[31680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
...
2020-02-01 08:09:12
181.62.248.12 attackbotsspam
Invalid user abc123 from 181.62.248.12 port 59100
2020-02-01 08:19:39
85.209.0.108 attackspam
3128/tcp 3128/tcp
[2020-01-31]2pkt
2020-02-01 08:00:37
43.243.187.222 attackspambots
445/tcp
[2020-01-31]1pkt
2020-02-01 08:10:38
119.42.73.130 attackspambots
23/tcp
[2020-01-31]1pkt
2020-02-01 07:51:45

Recently Reported IPs

37.71.70.57 3.135.195.28 23.29.253.113 220.196.123.31
143.101.227.41 159.65.82.228 71.52.105.135 110.179.155.62
106.70.31.199 32.215.195.220 84.45.143.116 44.208.228.218
77.218.104.147 111.231.32.127 210.219.100.10 215.47.219.42
61.72.103.45 101.83.157.194 54.198.11.85 80.39.64.225