Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: Cisco Systems Ironport Division

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
SSH login attempts.
2020-02-17 16:52:46
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.138.29.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35524
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.138.29.244.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021700 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 17 16:52:36 CST 2020
;; MSG SIZE  rcvd: 118
Host info
244.29.138.139.in-addr.arpa is an alias for 244.29.138.139.in-addr.arpa.ap.iphmx.com.
244.29.138.139.in-addr.arpa.ap.iphmx.com domain name pointer esa4.hc232-33.ap.iphmx.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.29.138.139.in-addr.arpa	canonical name = 244.29.138.139.in-addr.arpa.ap.iphmx.com.
244.29.138.139.in-addr.arpa.ap.iphmx.com	name = esa4.hc232-33.ap.iphmx.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.64.94.220 attackbots
08/09/2019-05:39:24.596843 125.64.94.220 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-09 17:51:07
117.206.195.37 attack
445/tcp
[2019-08-09]1pkt
2019-08-09 18:05:04
92.63.194.90 attack
Aug  9 11:10:47 localhost sshd\[12246\]: Invalid user admin from 92.63.194.90 port 59068
Aug  9 11:10:47 localhost sshd\[12246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
Aug  9 11:10:49 localhost sshd\[12246\]: Failed password for invalid user admin from 92.63.194.90 port 59068 ssh2
2019-08-09 17:39:47
121.200.54.2 attackbotsspam
Unauthorized connection attempt from IP address 121.200.54.2 on Port 445(SMB)
2019-08-09 18:18:11
202.62.45.53 attackbotsspam
Port scan and direct access per IP instead of hostname
2019-08-09 18:26:36
104.168.162.136 attack
[ssh] SSH attack
2019-08-09 17:57:53
148.72.54.171 attack
xmlrpc attack
2019-08-09 17:40:43
62.152.34.66 attack
Port scan and direct access per IP instead of hostname
2019-08-09 18:15:21
118.185.40.66 attack
Honeypot hit.
2019-08-09 18:39:41
182.50.151.54 attackspam
xmlrpc attack
2019-08-09 18:04:43
198.252.106.72 attackspam
xmlrpc attack
2019-08-09 18:35:11
121.160.198.198 attackspam
Aug  9 10:56:45 ns3367391 sshd\[16904\]: Invalid user student2 from 121.160.198.198 port 49252
Aug  9 10:56:45 ns3367391 sshd\[16904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.160.198.198
...
2019-08-09 18:22:01
120.50.28.40 attackbotsspam
Unauthorized connection attempt from IP address 120.50.28.40 on Port 445(SMB)
2019-08-09 18:16:39
167.99.46.145 attackspambots
Aug  9 09:01:26 www sshd\[15821\]: Invalid user tester1 from 167.99.46.145 port 32986
...
2019-08-09 17:49:07
115.201.105.91 attack
23/tcp
[2019-08-09]1pkt
2019-08-09 17:29:34

Recently Reported IPs

24.232.0.226 177.8.223.156 177.170.158.194 46.201.171.109
72.167.238.32 206.130.115.21 5.112.188.223 195.243.147.170
212.9.21.34 183.88.78.230 125.42.254.247 46.246.45.171
220.133.117.249 196.218.245.45 117.93.121.107 72.51.60.134
195.201.16.70 117.4.114.58 18.222.251.242 196.218.238.198