Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.119.2.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.119.2.47.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 03:38:55 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 47.2.119.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.2.119.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.213.43.164 attack
Dec  5 11:53:09 itv-usvr-01 sshd[6137]: Invalid user Pekka from 129.213.43.164
Dec  5 11:53:09 itv-usvr-01 sshd[6137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.43.164
Dec  5 11:53:09 itv-usvr-01 sshd[6137]: Invalid user Pekka from 129.213.43.164
Dec  5 11:53:11 itv-usvr-01 sshd[6137]: Failed password for invalid user Pekka from 129.213.43.164 port 40870 ssh2
Dec  5 12:00:01 itv-usvr-01 sshd[6354]: Invalid user schwedhelm from 129.213.43.164
2019-12-05 13:11:25
45.136.109.95 attackspam
12/04/2019-23:57:38.623806 45.136.109.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-05 13:06:22
91.121.205.83 attackbots
Dec  4 19:22:38 *** sshd[18302]: Invalid user server from 91.121.205.83
2019-12-05 08:54:17
202.69.191.85 attackspambots
Dec  5 01:11:35 Ubuntu-1404-trusty-64-minimal sshd\[2575\]: Invalid user teana from 202.69.191.85
Dec  5 01:11:35 Ubuntu-1404-trusty-64-minimal sshd\[2575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.69.191.85
Dec  5 01:11:37 Ubuntu-1404-trusty-64-minimal sshd\[2575\]: Failed password for invalid user teana from 202.69.191.85 port 42342 ssh2
Dec  5 01:22:27 Ubuntu-1404-trusty-64-minimal sshd\[11563\]: Invalid user adabas from 202.69.191.85
Dec  5 01:22:27 Ubuntu-1404-trusty-64-minimal sshd\[11563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.69.191.85
2019-12-05 08:39:21
42.159.93.208 attackbots
Lines containing failures of 42.159.93.208
Dec  4 20:07:31 shared02 sshd[21047]: Invalid user bettcher from 42.159.93.208 port 60236
Dec  4 20:07:31 shared02 sshd[21047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.93.208
Dec  4 20:07:33 shared02 sshd[21047]: Failed password for invalid user bettcher from 42.159.93.208 port 60236 ssh2
Dec  4 20:07:33 shared02 sshd[21047]: Received disconnect from 42.159.93.208 port 60236:11: Bye Bye [preauth]
Dec  4 20:07:33 shared02 sshd[21047]: Disconnected from invalid user bettcher 42.159.93.208 port 60236 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=42.159.93.208
2019-12-05 08:43:50
186.10.17.84 attackbotsspam
SSH bruteforce
2019-12-05 13:11:05
89.44.183.105 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-05 08:35:35
196.52.43.57 attackbots
Fail2Ban Ban Triggered
2019-12-05 08:39:38
200.34.88.37 attackspambots
Dec  4 18:51:35 kapalua sshd\[11650\]: Invalid user blake from 200.34.88.37
Dec  4 18:51:35 kapalua sshd\[11650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.34.88.37
Dec  4 18:51:37 kapalua sshd\[11650\]: Failed password for invalid user blake from 200.34.88.37 port 47790 ssh2
Dec  4 18:57:42 kapalua sshd\[12330\]: Invalid user couscous from 200.34.88.37
Dec  4 18:57:42 kapalua sshd\[12330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.34.88.37
2019-12-05 13:01:24
190.177.134.81 attack
" "
2019-12-05 08:47:47
89.243.81.88 attackspam
LGS,WP GET /wp-login.php
2019-12-05 13:09:13
106.200.106.47 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-12-05 08:31:21
61.175.134.190 attackbotsspam
Dec  5 05:57:40 andromeda sshd\[13674\]: Invalid user topher from 61.175.134.190 port 57133
Dec  5 05:57:40 andromeda sshd\[13674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.134.190
Dec  5 05:57:42 andromeda sshd\[13674\]: Failed password for invalid user topher from 61.175.134.190 port 57133 ssh2
2019-12-05 13:01:06
120.131.3.119 attackspam
Dec  5 05:48:42 * sshd[21473]: Failed password for root from 120.131.3.119 port 33608 ssh2
2019-12-05 13:12:47
139.155.33.169 attack
Repeated brute force against a port
2019-12-05 08:42:38

Recently Reported IPs

60.231.100.120 99.115.196.134 91.33.89.231 168.114.119.214
9.51.0.92 37.24.162.80 239.181.61.108 205.70.213.249
242.229.243.8 124.91.35.211 150.246.43.215 206.188.118.54
19.93.99.104 98.5.85.55 133.124.57.107 140.70.40.139
79.250.141.247 87.224.122.166 171.225.227.57 60.222.86.119