Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Orange

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.2.249.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.2.249.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:52:03 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 19.249.2.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.249.2.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.108.36.17 attack
Invalid user default from 176.108.36.17 port 40008
2020-02-19 08:46:29
35.236.182.219 attack
Invalid user ubuntu from 35.236.182.219 port 38158
2020-02-19 09:12:29
103.219.112.47 attackbots
Tried sshing with brute force.
2020-02-19 08:36:50
115.97.17.171 attack
Automatic report - Port Scan Attack
2020-02-19 08:38:40
62.178.206.239 attack
Invalid user vivek from 62.178.206.239 port 44022
2020-02-19 08:52:20
118.190.88.147 attack
Invalid user user from 118.190.88.147 port 45004
2020-02-19 08:49:45
185.230.82.40 attackbotsspam
SSH Brute Force
2020-02-19 08:58:45
66.96.233.31 attackspam
Invalid user leah from 66.96.233.31 port 49486
2020-02-19 09:09:22
188.127.182.169 attackspam
Invalid user andy from 188.127.182.169 port 48095
2020-02-19 09:15:29
77.93.126.12 attackspam
Invalid user sinus from 77.93.126.12 port 52996
2020-02-19 09:07:59
176.56.0.23 attackbotsspam
Unauthorized connection attempt from IP address 176.56.0.23 on Port 445(SMB)
2020-02-19 08:36:19
50.247.146.133 attackspambots
Feb 18 21:05:50 firewall sshd[15408]: Invalid user deploy from 50.247.146.133
Feb 18 21:05:52 firewall sshd[15408]: Failed password for invalid user deploy from 50.247.146.133 port 57174 ssh2
Feb 18 21:08:51 firewall sshd[15566]: Invalid user nagios from 50.247.146.133
...
2020-02-19 08:53:48
78.213.119.22 attackspambots
Feb 19 01:35:06 MK-Soft-Root2 sshd[29208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.213.119.22 
Feb 19 01:35:07 MK-Soft-Root2 sshd[29208]: Failed password for invalid user d from 78.213.119.22 port 45004 ssh2
...
2020-02-19 09:07:32
89.128.118.41 attack
Total attacks: 2
2020-02-19 09:06:03
2.229.241.23 attackspambots
Invalid user testuser from 2.229.241.23 port 42496
2020-02-19 09:14:20

Recently Reported IPs

79.75.189.62 18.224.120.5 151.59.124.224 154.24.7.121
78.102.207.124 187.127.209.113 32.173.100.50 208.27.205.117
119.73.2.82 239.247.92.134 218.42.72.249 103.175.136.165
24.130.79.188 93.61.64.28 85.134.115.135 180.250.200.28
113.76.233.12 47.250.51.226 189.95.178.174 189.8.148.69