Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.129.143.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.129.143.244.		IN	A

;; AUTHORITY SECTION:
.			144	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:32:30 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 244.143.129.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.143.129.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.71.158.83 attackspam
Honeypot attack, port: 445, PTR: 201-71-158-83-arpa.younet.com.br.
2020-07-16 22:53:32
206.189.213.130 attack
WordPress logging hack
2020-07-16 23:10:20
162.62.19.220 attackbotsspam
[Fri Jun 26 06:46:16 2020] - DDoS Attack From IP: 162.62.19.220 Port: 33881
2020-07-16 23:04:00
140.143.57.203 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-16T14:02:02Z and 2020-07-16T14:14:25Z
2020-07-16 22:50:55
61.184.108.246 attack
failed_logins
2020-07-16 23:11:54
154.17.8.73 attackbotsspam
Jul 16 15:24:30 onepixel sshd[2837816]: Invalid user labuser2 from 154.17.8.73 port 47436
Jul 16 15:24:30 onepixel sshd[2837816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.17.8.73 
Jul 16 15:24:30 onepixel sshd[2837816]: Invalid user labuser2 from 154.17.8.73 port 47436
Jul 16 15:24:32 onepixel sshd[2837816]: Failed password for invalid user labuser2 from 154.17.8.73 port 47436 ssh2
Jul 16 15:28:31 onepixel sshd[2839834]: Invalid user support from 154.17.8.73 port 34418
2020-07-16 23:29:31
106.58.180.83 attackbots
Jul 16 16:47:11 h2779839 sshd[5629]: Invalid user sanga from 106.58.180.83 port 46746
Jul 16 16:47:11 h2779839 sshd[5629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.58.180.83
Jul 16 16:47:11 h2779839 sshd[5629]: Invalid user sanga from 106.58.180.83 port 46746
Jul 16 16:47:12 h2779839 sshd[5629]: Failed password for invalid user sanga from 106.58.180.83 port 46746 ssh2
Jul 16 16:49:23 h2779839 sshd[5643]: Invalid user amministratore from 106.58.180.83 port 40672
Jul 16 16:49:23 h2779839 sshd[5643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.58.180.83
Jul 16 16:49:23 h2779839 sshd[5643]: Invalid user amministratore from 106.58.180.83 port 40672
Jul 16 16:49:26 h2779839 sshd[5643]: Failed password for invalid user amministratore from 106.58.180.83 port 40672 ssh2
Jul 16 16:51:43 h2779839 sshd[5666]: Invalid user sshuser from 106.58.180.83 port 34598
...
2020-07-16 23:25:54
116.196.116.205 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-07-16 22:47:27
222.186.30.57 attackspambots
Unauthorized connection attempt detected from IP address 222.186.30.57 to port 22
2020-07-16 22:52:52
52.188.153.190 attackbots
Jul 16 05:54:20 scw-tender-jepsen sshd[3764]: Failed password for root from 52.188.153.190 port 39306 ssh2
2020-07-16 23:07:41
185.143.73.142 attackbotsspam
Jul 16 16:24:48 blackbee postfix/smtpd[31241]: warning: unknown[185.143.73.142]: SASL LOGIN authentication failed: authentication failure
Jul 16 16:25:11 blackbee postfix/smtpd[31251]: warning: unknown[185.143.73.142]: SASL LOGIN authentication failed: authentication failure
Jul 16 16:25:35 blackbee postfix/smtpd[31241]: warning: unknown[185.143.73.142]: SASL LOGIN authentication failed: authentication failure
Jul 16 16:25:53 blackbee postfix/smtpd[31241]: warning: unknown[185.143.73.142]: SASL LOGIN authentication failed: authentication failure
Jul 16 16:26:19 blackbee postfix/smtpd[31251]: warning: unknown[185.143.73.142]: SASL LOGIN authentication failed: authentication failure
...
2020-07-16 23:27:03
35.195.238.142 attackspam
Jul 16 16:56:02 ns37 sshd[17925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.195.238.142
Jul 16 16:56:04 ns37 sshd[17925]: Failed password for invalid user upload from 35.195.238.142 port 40326 ssh2
Jul 16 17:00:09 ns37 sshd[18631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.195.238.142
2020-07-16 23:18:48
107.170.104.125 attackspambots
2020-07-16T14:42:02.137334shield sshd\[29239\]: Invalid user boss from 107.170.104.125 port 43462
2020-07-16T14:42:02.147077shield sshd\[29239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.jambcbttest.com
2020-07-16T14:42:03.792927shield sshd\[29239\]: Failed password for invalid user boss from 107.170.104.125 port 43462 ssh2
2020-07-16T14:50:59.007005shield sshd\[31354\]: Invalid user franz from 107.170.104.125 port 49370
2020-07-16T14:50:59.016045shield sshd\[31354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.jambcbttest.com
2020-07-16 23:16:31
122.116.2.20 attackspambots
Port Scan detected!
...
2020-07-16 23:21:25
183.82.121.34 attackbotsspam
SSH brute-force attempt
2020-07-16 22:58:29

Recently Reported IPs

139.129.141.82 139.129.144.183 139.129.144.98 139.129.144.227
139.129.145.226 139.129.144.179 139.129.145.210 139.129.145.250
139.129.146.105 139.129.146.167 139.129.146.19 139.129.146.209
139.129.146.103 139.129.146.36 139.129.146.17 139.129.146.7
139.129.146.4 139.129.146.213 139.129.146.37 139.129.147.113