Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.196.19.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;249.196.19.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:44:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 159.19.196.249.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.19.196.249.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.163.71.180 attackbotsspam
RDP Brute-Force (honeypot 14)
2020-08-15 03:59:50
185.233.100.23 attack
SSH brute-force attempt
2020-08-15 04:00:10
81.40.51.123 attackbots
Lines containing failures of 81.40.51.123
Aug 12 13:29:38 nopeasti sshd[5872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.40.51.123  user=r.r
Aug 12 13:29:40 nopeasti sshd[5872]: Failed password for r.r from 81.40.51.123 port 55388 ssh2
Aug 12 13:29:41 nopeasti sshd[5872]: Received disconnect from 81.40.51.123 port 55388:11: Bye Bye [preauth]
Aug 12 13:29:41 nopeasti sshd[5872]: Disconnected from authenticating user r.r 81.40.51.123 port 55388 [preauth]
Aug 12 13:35:01 nopeasti sshd[6997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.40.51.123  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.40.51.123
2020-08-15 04:17:59
138.59.82.5 attackbotsspam
1597407499 - 08/14/2020 14:18:19 Host: 138.59.82.5/138.59.82.5 Port: 445 TCP Blocked
2020-08-15 04:29:14
91.232.4.149 attackspambots
Aug 14 15:55:08 gospond sshd[29082]: Failed password for root from 91.232.4.149 port 59794 ssh2
Aug 14 15:55:05 gospond sshd[29082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.232.4.149  user=root
Aug 14 15:55:08 gospond sshd[29082]: Failed password for root from 91.232.4.149 port 59794 ssh2
...
2020-08-15 04:28:47
107.77.172.41 attackbotsspam
Brute forcing email accounts
2020-08-15 04:11:04
123.59.120.36 attackbots
Aug 14 21:02:55 host sshd[5107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.120.36  user=root
Aug 14 21:02:57 host sshd[5107]: Failed password for root from 123.59.120.36 port 42661 ssh2
...
2020-08-15 04:21:22
49.235.83.136 attack
Aug 14 20:45:15 l03 sshd[12798]: Invalid user adisadmin from 49.235.83.136 port 50164
...
2020-08-15 03:57:19
68.168.142.91 attackspambots
Aug  9 22:27:51 host sshd[26889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.142.91.16clouds.com  user=r.r
Aug  9 22:27:53 host sshd[26889]: Failed password for r.r from 68.168.142.91 port 45312 ssh2
Aug  9 22:27:53 host sshd[26889]: Received disconnect from 68.168.142.91: 11: Bye Bye [preauth]
Aug  9 22:33:51 host sshd[16383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.142.91.16clouds.com  user=r.r
Aug  9 22:33:53 host sshd[16383]: Failed password for r.r from 68.168.142.91 port 40190 ssh2
Aug  9 22:33:53 host sshd[16383]: Received disconnect from 68.168.142.91: 11: Bye Bye [preauth]
Aug  9 22:35:52 host sshd[23296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.142.91.16clouds.com  user=r.r
Aug  9 22:35:54 host sshd[23296]: Failed password for r.r from 68.168.142.91 port 53716 ssh2
Aug  9 22:35:54 host sshd[23296]: Re........
-------------------------------
2020-08-15 04:32:05
117.232.127.51 attackbots
Aug 14 22:01:13 ns37 sshd[11393]: Failed password for root from 117.232.127.51 port 39518 ssh2
Aug 14 22:04:51 ns37 sshd[11534]: Failed password for root from 117.232.127.51 port 55558 ssh2
2020-08-15 04:27:49
82.196.9.161 attackspam
*Port Scan* detected from 82.196.9.161 (NL/Netherlands/North Holland/Amsterdam-Zuidoost/-). 4 hits in the last 251 seconds
2020-08-15 04:00:48
118.140.183.42 attackbots
Aug 14 14:09:26 dev0-dcde-rnet sshd[13756]: Failed password for root from 118.140.183.42 port 43046 ssh2
Aug 14 14:14:08 dev0-dcde-rnet sshd[13800]: Failed password for root from 118.140.183.42 port 59062 ssh2
2020-08-15 04:12:24
185.29.93.18 attack
20/8/14@08:18:15: FAIL: Alarm-Network address from=185.29.93.18
20/8/14@08:18:15: FAIL: Alarm-Network address from=185.29.93.18
...
2020-08-15 04:33:40
54.38.5.221 attackspam
Brute force attempt
2020-08-15 04:22:41
194.180.224.103 attackbots
SSH break in attempt
...
2020-08-15 04:15:20

Recently Reported IPs

31.251.86.69 38.29.8.253 124.14.212.140 245.27.157.85
44.229.46.179 95.240.76.73 174.223.201.14 23.69.159.22
136.221.36.61 25.82.180.252 99.145.60.228 232.67.66.64
141.150.11.106 124.119.236.153 196.204.1.110 152.127.40.200
247.166.241.53 212.253.216.31 255.246.22.44 252.41.101.184