Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.249.166.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.249.166.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 07:25:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
103.166.249.2.in-addr.arpa domain name pointer 2-249-166-103-no2657.digitaltv.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.166.249.2.in-addr.arpa	name = 2-249-166-103-no2657.digitaltv.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.173.253.197 attackspambots
Unauthorized connection attempt detected from IP address 79.173.253.197 to port 9530
2020-04-13 04:33:13
172.104.122.237 attackbots
Portscan
2020-04-13 04:43:43
72.76.148.6 attack
400 BAD REQUEST
2020-04-13 04:36:46
118.25.18.30 attack
Apr 12 22:41:57 ks10 sshd[4063275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.18.30  user=games
Apr 12 22:41:59 ks10 sshd[4063275]: Failed password for invalid user games from 118.25.18.30 port 41274 ssh2
...
2020-04-13 04:43:59
187.11.223.180 attackbotsspam
Unauthorized connection attempt detected from IP address 187.11.223.180 to port 23
2020-04-13 04:15:39
84.238.55.212 attackbots
Unauthorized connection attempt detected from IP address 84.238.55.212 to port 23
2020-04-13 04:31:43
82.209.218.213 attackbotsspam
Port probing on unauthorized port 3389
2020-04-13 04:47:44
185.118.24.241 attackspam
Unauthorized connection attempt detected from IP address 185.118.24.241 to port 1433
2020-04-13 04:17:17
62.6.218.123 attack
Unauthorized connection attempt detected from IP address 62.6.218.123 to port 8080
2020-04-13 04:41:09
94.226.189.17 attackspam
Unauthorized connection attempt detected from IP address 94.226.189.17 to port 23
2020-04-13 04:27:53
94.27.149.181 attackbotsspam
Unauthorized connection attempt detected from IP address 94.27.149.181 to port 81
2020-04-13 04:28:38
2.233.127.102 attackspambots
Unauthorized connection attempt detected from IP address 2.233.127.102 to port 80
2020-04-13 04:08:49
138.122.4.46 attack
Unauthorized connection attempt detected from IP address 138.122.4.46 to port 80
2020-04-13 04:24:26
222.186.30.248 attackbots
Brute-force attempt banned
2020-04-13 04:46:37
178.72.157.252 attackbotsspam
Unauthorized connection attempt detected from IP address 178.72.157.252 to port 23
2020-04-13 04:20:21

Recently Reported IPs

120.73.252.249 194.120.42.154 88.40.187.94 39.104.152.38
98.238.180.61 239.174.150.63 208.115.249.28 121.174.127.157
175.66.89.184 26.241.103.238 146.140.230.230 19.92.235.231
8.219.199.70 122.219.63.170 219.187.224.89 95.14.196.167
146.103.189.80 135.207.207.2 198.240.180.29 18.55.123.178