Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hull

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.249.239.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.249.239.19.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Wed Nov 04 09:20:57 CST 2020
;; MSG SIZE  rcvd: 118

Host info
19.239.249.213.in-addr.arpa domain name pointer adsl-213-249-239-19.karoo.kcom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.239.249.213.in-addr.arpa	name = adsl-213-249-239-19.karoo.kcom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.96.137.84 attackbotsspam
Port Scan detected!
...
2020-10-03 20:25:04
167.114.96.156 attack
Oct  3 15:06:51 master sshd[31402]: Failed password for invalid user cert from 167.114.96.156 port 52406 ssh2
2020-10-03 20:10:28
128.199.88.188 attackspam
Invalid user user2 from 128.199.88.188 port 58799
2020-10-03 20:02:56
213.190.48.144 attackspam
1601670803 - 10/02/2020 22:33:23 Host: 213.190.48.144/213.190.48.144 Port: 445 TCP Blocked
...
2020-10-03 20:04:17
180.76.118.175 attack
SSH login attempts.
2020-10-03 20:26:53
101.227.82.219 attackbots
Oct  3 09:20:54 vlre-nyc-1 sshd\[18897\]: Invalid user git from 101.227.82.219
Oct  3 09:20:54 vlre-nyc-1 sshd\[18897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.227.82.219
Oct  3 09:20:56 vlre-nyc-1 sshd\[18897\]: Failed password for invalid user git from 101.227.82.219 port 56048 ssh2
Oct  3 09:24:49 vlre-nyc-1 sshd\[18927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.227.82.219  user=root
Oct  3 09:24:51 vlre-nyc-1 sshd\[18927\]: Failed password for root from 101.227.82.219 port 15477 ssh2
...
2020-10-03 20:05:49
81.69.177.253 attack
Invalid user testftp1 from 81.69.177.253 port 40796
2020-10-03 20:42:02
208.109.13.144 attackbots
Invalid user yt from 208.109.13.144 port 39024
2020-10-03 20:08:47
180.76.57.58 attack
Invalid user rajat from 180.76.57.58 port 49046
2020-10-03 20:25:31
208.109.9.14 attackspam
$f2bV_matches
2020-10-03 20:35:41
103.55.91.131 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-03 20:31:45
223.99.203.186 attackbots
Automatic report - Banned IP Access
2020-10-03 20:14:29
217.21.54.221 attackspam
Invalid user jiayuanyang from 217.21.54.221 port 46354
2020-10-03 20:30:51
138.197.151.213 attackbots
Invalid user nicole from 138.197.151.213 port 53520
2020-10-03 20:29:10
64.225.11.24 attackbotsspam
Invalid user admin from 64.225.11.24 port 41874
2020-10-03 20:20:26

Recently Reported IPs

190.4.114.228 190.4.115.243 190.184.241.156 190.184.241.75
190.4.118.178 200.27.183.34 115.219.7.166 186.22.238.193
191.115.59.149 45.227.94.72 45.228.209.147 2800:810:557:2a48:4c0b:b36d:a087:7f10
190.196.94.142 92.47.147.126 186.158.20.37 138.59.142.254
2803:9800:a036:8013:2863:ec17:5324:de7d 186.143.137.36 74.12.107.150 187.183.39.213