Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Solna

Region: Stockholms

Country: Sweden

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.249.40.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.249.40.197.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024040302 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 04 04:18:23 CST 2024
;; MSG SIZE  rcvd: 105
Host info
197.40.249.2.in-addr.arpa domain name pointer 2-249-40-197-no3540.tbcn.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.40.249.2.in-addr.arpa	name = 2-249-40-197-no3540.tbcn.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.56.141.193 attackspambots
2019-10-31T14:42:18.656568abusebot-4.cloudsearch.cf sshd\[4989\]: Invalid user securityagent from 149.56.141.193 port 33778
2019-10-31 22:57:46
203.113.119.226 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-31 22:56:42
138.68.219.40 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-10-31 22:41:31
94.177.215.195 attack
2019-10-31T14:11:00.439751abusebot-7.cloudsearch.cf sshd\[21562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.215.195  user=root
2019-10-31 22:31:12
54.186.180.241 attackspam
10/31/2019-15:40:08.314148 54.186.180.241 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-31 22:41:49
148.72.206.225 attack
k+ssh-bruteforce
2019-10-31 22:51:19
202.215.36.230 attackbots
Oct 31 03:27:14 php1 sshd\[21323\]: Invalid user yyt124 from 202.215.36.230
Oct 31 03:27:14 php1 sshd\[21323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202-215-36-230.saitama.fdn.vectant.ne.jp
Oct 31 03:27:16 php1 sshd\[21323\]: Failed password for invalid user yyt124 from 202.215.36.230 port 50501 ssh2
Oct 31 03:30:08 php1 sshd\[21753\]: Invalid user PASS@WORD from 202.215.36.230
Oct 31 03:30:08 php1 sshd\[21753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202-215-36-230.saitama.fdn.vectant.ne.jp
2019-10-31 22:15:48
112.64.34.165 attack
Oct 31 13:40:14 lnxweb62 sshd[20896]: Failed password for root from 112.64.34.165 port 48375 ssh2
Oct 31 13:40:14 lnxweb62 sshd[20896]: Failed password for root from 112.64.34.165 port 48375 ssh2
2019-10-31 22:22:19
167.71.186.103 attackbots
Automatic report - Web App Attack
2019-10-31 22:24:07
111.231.66.135 attackbots
Oct 31 15:35:40 vps01 sshd[16455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.66.135
Oct 31 15:35:42 vps01 sshd[16455]: Failed password for invalid user zhan from 111.231.66.135 port 60962 ssh2
2019-10-31 22:43:55
223.241.247.214 attack
Oct 31 13:41:55 game-panel sshd[20255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214
Oct 31 13:41:57 game-panel sshd[20255]: Failed password for invalid user Monaco-123 from 223.241.247.214 port 50891 ssh2
Oct 31 13:48:20 game-panel sshd[20481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214
2019-10-31 22:10:34
188.68.37.212 attackbotsspam
Oct 31 13:05:28 v22018076622670303 sshd\[3518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.68.37.212  user=root
Oct 31 13:05:30 v22018076622670303 sshd\[3518\]: Failed password for root from 188.68.37.212 port 34914 ssh2
Oct 31 13:05:30 v22018076622670303 sshd\[3520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.68.37.212  user=root
...
2019-10-31 22:30:41
183.239.193.149 attackbotsspam
10/31/2019-15:23:28.358578 183.239.193.149 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-31 22:34:49
190.145.25.166 attackbotsspam
Oct 31 14:26:28 dedicated sshd[14982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.166  user=root
Oct 31 14:26:30 dedicated sshd[14982]: Failed password for root from 190.145.25.166 port 15458 ssh2
2019-10-31 22:32:53
109.124.78.187 attack
2019-10-31T14:12:25.495795abusebot-7.cloudsearch.cf sshd\[21569\]: Invalid user wilsonchan from 109.124.78.187 port 57553
2019-10-31 22:27:22

Recently Reported IPs

2.59.149.206 2.188.162.20 2.188.162.158 3.0.0.70
2.59.157.10 2.59.157.26 2.59.149.194 2.59.157.62
2.59.148.60 2.59.156.22 2.59.149.244 2.59.157.74
2.59.157.143 2.59.157.161 2.59.181.107 2.206.25.82
2.188.160.98 2.135.147.82 2.59.181.102 2.228.174.156