Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.19.194.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.19.194.211.			IN	A

;; AUTHORITY SECTION:
.			308	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020111400 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 15 00:15:53 CST 2020
;; MSG SIZE  rcvd: 116

Host info
211.194.19.2.in-addr.arpa domain name pointer a2-19-194-211.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.194.19.2.in-addr.arpa	name = a2-19-194-211.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.124.74.75 attack
Email rejected due to spam filtering
2020-05-13 08:36:30
14.161.197.21 attack
DATE:2020-05-12 23:11:17, IP:14.161.197.21, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-13 08:22:11
61.160.107.66 attack
May 13 01:15:09 vps333114 sshd[13413]: Failed password for root from 61.160.107.66 port 11473 ssh2
May 13 01:29:47 vps333114 sshd[13794]: Invalid user postgres from 61.160.107.66
...
2020-05-13 08:34:25
183.87.192.235 attackbotsspam
Invalid user xns from 183.87.192.235 port 57366
2020-05-13 08:26:15
150.143.244.2 attackspambots
Automated report (2020-05-12T14:11:42-07:00). Caught masquerading as Facebook external hit. Caught masquerading as Twitterbot.
2020-05-13 07:55:14
106.13.199.79 attackbots
May 12 23:30:09 raspberrypi sshd\[25940\]: Invalid user ivanova from 106.13.199.79May 12 23:30:12 raspberrypi sshd\[25940\]: Failed password for invalid user ivanova from 106.13.199.79 port 55272 ssh2May 12 23:36:49 raspberrypi sshd\[30192\]: Failed password for root from 106.13.199.79 port 58416 ssh2
...
2020-05-13 08:31:52
111.67.196.5 attack
May 12 17:59:45 NPSTNNYC01T sshd[2857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.196.5
May 12 17:59:47 NPSTNNYC01T sshd[2857]: Failed password for invalid user miv from 111.67.196.5 port 53636 ssh2
May 12 18:03:59 NPSTNNYC01T sshd[3259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.196.5
...
2020-05-13 08:27:16
195.122.226.164 attackbotsspam
SSH brute force
2020-05-13 08:00:21
58.250.0.73 attackspam
May 13 02:10:22 pkdns2 sshd\[41094\]: Invalid user admin from 58.250.0.73May 13 02:10:24 pkdns2 sshd\[41094\]: Failed password for invalid user admin from 58.250.0.73 port 52536 ssh2May 13 02:13:33 pkdns2 sshd\[41219\]: Invalid user biology from 58.250.0.73May 13 02:13:35 pkdns2 sshd\[41219\]: Failed password for invalid user biology from 58.250.0.73 port 35542 ssh2May 13 02:16:49 pkdns2 sshd\[41371\]: Invalid user firebird from 58.250.0.73May 13 02:16:52 pkdns2 sshd\[41371\]: Failed password for invalid user firebird from 58.250.0.73 port 46804 ssh2
...
2020-05-13 07:52:54
138.197.43.206 attackspambots
WordPress wp-login brute force :: 138.197.43.206 0.100 - [12/May/2020:23:39:30  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1837 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-05-13 08:17:57
104.248.36.120 attackbotsspam
Port scan(s) (1) denied
2020-05-13 07:54:16
165.22.102.27 attack
May 12 23:38:45 ns3033917 sshd[6736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.102.27
May 12 23:38:45 ns3033917 sshd[6736]: Invalid user mukunda from 165.22.102.27 port 57848
May 12 23:38:47 ns3033917 sshd[6736]: Failed password for invalid user mukunda from 165.22.102.27 port 57848 ssh2
...
2020-05-13 08:27:43
218.81.50.112 attack
TCP src-port=53480   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (111)
2020-05-13 07:52:05
181.137.134.13 attackspam
Automatic report - Port Scan Attack
2020-05-13 08:30:48
157.230.226.254 attackspam
Invalid user segelinde from 157.230.226.254 port 42244
2020-05-13 08:00:47

Recently Reported IPs

63.117.14.83 14.222.74.185 115.76.50.215 183.82.117.152
44.237.24.85 45.12.220.76 164.68.111.201 85.193.97.222
73.40.33.159 73.40.33.119 191.241.133.8 1.247.63.212
69.94.130.18 107.80.169.182 40.94.89.1 201.141.63.149
31.201.45.125 83.130.68.8 207.244.252.194 76.67.22.6