Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.205.149.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.205.149.219.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:10:04 CST 2022
;; MSG SIZE  rcvd: 108
Host info
219.149.205.212.in-addr.arpa domain name pointer 219.149.205.212.static.otenet.gr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.149.205.212.in-addr.arpa	name = 219.149.205.212.static.otenet.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
216.218.206.82 attackbots
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=57806  .  dstport=23  .     (3613)
2020-09-20 17:01:29
184.105.139.69 attack
Automatic report - Banned IP Access
2020-09-20 16:47:41
221.124.63.193 attack
Automatic report - Banned IP Access
2020-09-20 16:43:00
106.12.133.38 attackspam
Sep 20 03:46:10 ourumov-web sshd\[16085\]: Invalid user tomcat from 106.12.133.38 port 35448
Sep 20 03:46:11 ourumov-web sshd\[16085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.38
Sep 20 03:46:12 ourumov-web sshd\[16085\]: Failed password for invalid user tomcat from 106.12.133.38 port 35448 ssh2
...
2020-09-20 16:52:26
46.46.85.97 attack
RDP Bruteforce
2020-09-20 17:10:34
185.202.2.131 attack
RDP Bruteforce
2020-09-20 17:07:57
134.19.215.196 attackspam
Draytek Vigor Remote Command Execution Vulnerability
2020-09-20 16:40:14
123.234.249.118 attackbots
404 NOT FOUND
2020-09-20 16:45:48
172.81.210.175 attackspambots
$f2bV_matches
2020-09-20 17:03:14
89.187.178.18 attackspambots
(From undiswagib1984@mailbox24.top) New search engine. - 1000 000$  
 
Card issuers are raking in the dough on interest fees that still compound every month. The answers to these queries are essential. If you're new to forex, product . need forex charts. 
1000 000 
 
Money isn't the cause of all bad. People are the reason for all resources. People use money folks use ladies. It's the game of life. Life cannot be played without money. This particular really is rule number one.
2020-09-20 16:49:23
1.202.76.226 attack
Sep 20 10:05:25 rocket sshd[8713]: Failed password for root from 1.202.76.226 port 29597 ssh2
Sep 20 10:09:53 rocket sshd[9244]: Failed password for git from 1.202.76.226 port 24262 ssh2
...
2020-09-20 17:14:25
114.45.49.74 attackbots
Listed on    zen-spamhaus also barracudaCentral and abuseat.org   / proto=6  .  srcport=6384  .  dstport=23  .     (4223)
2020-09-20 16:44:20
54.176.101.14 attackbots
Automatically reported by fail2ban report script (mx1)
2020-09-20 16:51:29
58.69.112.243 attackbots
Unauthorized connection attempt from IP address 58.69.112.243 on Port 445(SMB)
2020-09-20 16:50:10
120.53.243.163 attackbotsspam
Port Scan
...
2020-09-20 16:51:57

Recently Reported IPs

123.10.133.162 23.119.148.29 77.122.47.234 79.138.35.132
165.16.27.6 45.66.208.44 171.241.33.183 190.52.198.24
177.38.76.153 103.113.0.2 95.17.119.254 185.80.218.125
185.46.170.253 152.32.205.239 39.72.127.69 171.217.251.91
182.32.62.140 184.178.56.125 219.100.37.244 114.35.78.235