Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: Linode LLC

Hostname: unknown

Organization: Linode, LLC

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
 TCP (SYN) 139.162.98.244:57816 -> port 8118, len 44
2020-09-17 01:58:21
attack
Port Scan
...
2020-09-16 18:14:48
attackspambots
 TCP (SYN) 139.162.98.244:59055 -> port 8118, len 44
2020-08-13 04:50:58
attack
8118/tcp 8118/tcp 8118/tcp...
[2020-05-11/07-11]62pkt,1pt.(tcp)
2020-07-11 09:17:22
attack
Port 8118 scan denied
2020-04-08 13:54:18
attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-06 03:14:03
attackbotsspam
unauthorized connection attempt
2020-02-04 13:28:33
attackbots
" "
2020-01-02 08:22:18
attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-18 06:16:26
attack
firewall-block, port(s): 8118/tcp
2019-10-31 16:55:26
attackspambots
firewall-block, port(s): 8118/tcp
2019-10-27 00:10:23
attackspambots
" "
2019-09-29 23:52:45
attack
firewall-block, port(s): 8118/tcp
2019-09-26 09:10:30
attack
8118/tcp 8118/tcp 8118/tcp...
[2019-05-19/07-19]78pkt,1pt.(tcp)
2019-07-20 02:02:06
attackbotsspam
" "
2019-07-05 14:44:06
attackspam
8118/tcp 8118/tcp 8118/tcp...
[2019-05-03/07-03]74pkt,1pt.(tcp)
2019-07-03 13:38:44
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.98.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8008
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.162.98.244.			IN	A

;; AUTHORITY SECTION:
.			2658	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040900 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 09 16:10:43 +08 2019
;; MSG SIZE  rcvd: 118

Host info
244.98.162.139.in-addr.arpa domain name pointer scan-118.security.ipip.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
244.98.162.139.in-addr.arpa	name = scan-118.security.ipip.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
125.130.142.12 attackbotsspam
Sep  7 15:07:49 s64-1 sshd[24129]: Failed password for root from 125.130.142.12 port 33216 ssh2
Sep  7 15:12:18 s64-1 sshd[24161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.142.12
Sep  7 15:12:20 s64-1 sshd[24161]: Failed password for invalid user guest from 125.130.142.12 port 47538 ssh2
...
2019-09-07 21:18:46
104.200.134.150 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-09-07 21:13:35
92.63.194.56 attack
firewall-block, port(s): 3389/tcp
2019-09-07 20:41:47
176.31.172.40 attackbotsspam
Automated report - ssh fail2ban:
Sep 7 13:50:39 authentication failure 
Sep 7 13:50:42 wrong password, user=qwertyuiop, port=33908, ssh2
Sep 7 13:54:45 authentication failure
2019-09-07 20:38:14
176.31.181.171 attackspambots
Sep  7 18:18:01 areeb-Workstation sshd[11415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.181.171
Sep  7 18:18:04 areeb-Workstation sshd[11415]: Failed password for invalid user alex from 176.31.181.171 port 60632 ssh2
...
2019-09-07 21:17:03
45.136.109.85 attack
Port scan on 3 port(s): 8416 15739 33632
2019-09-07 20:58:52
218.92.0.143 attack
Sep  7 05:49:08 aat-srv002 sshd[6996]: Failed password for root from 218.92.0.143 port 8146 ssh2
Sep  7 05:49:22 aat-srv002 sshd[6996]: Failed password for root from 218.92.0.143 port 8146 ssh2
Sep  7 05:49:22 aat-srv002 sshd[6996]: error: maximum authentication attempts exceeded for root from 218.92.0.143 port 8146 ssh2 [preauth]
Sep  7 05:49:26 aat-srv002 sshd[7006]: Failed password for root from 218.92.0.143 port 20952 ssh2
...
2019-09-07 21:23:52
185.160.216.190 attackspam
[portscan] Port scan
2019-09-07 20:37:22
124.156.140.219 attack
Sep  7 16:20:47 taivassalofi sshd[28000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.140.219
Sep  7 16:20:49 taivassalofi sshd[28000]: Failed password for invalid user ubuntu from 124.156.140.219 port 33814 ssh2
...
2019-09-07 21:24:53
125.18.118.208 attack
Unauthorized connection attempt from IP address 125.18.118.208 on Port 445(SMB)
2019-09-07 20:39:14
218.98.26.163 attackspambots
Sep  7 09:05:54 ny01 sshd[27194]: Failed password for root from 218.98.26.163 port 53494 ssh2
Sep  7 09:06:04 ny01 sshd[27195]: Failed password for root from 218.98.26.163 port 61861 ssh2
2019-09-07 21:07:38
59.25.197.130 attackspam
2019-09-07T11:22:31.728070abusebot-5.cloudsearch.cf sshd\[12501\]: Invalid user shu from 59.25.197.130 port 49948
2019-09-07 21:15:19
51.15.42.184 attackbotsspam
firewall-block, port(s): 445/tcp
2019-09-07 20:47:36
60.185.110.140 attackbots
Sep  7 11:10:26 econome sshd[8894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.185.110.140  user=r.r
Sep  7 11:10:28 econome sshd[8894]: Failed password for r.r from 60.185.110.140 port 42279 ssh2
Sep  7 11:10:31 econome sshd[8894]: Failed password for r.r from 60.185.110.140 port 42279 ssh2
Sep  7 11:10:33 econome sshd[8894]: Failed password for r.r from 60.185.110.140 port 42279 ssh2
Sep  7 11:10:35 econome sshd[8894]: Failed password for r.r from 60.185.110.140 port 42279 ssh2
Sep  7 11:10:38 econome sshd[8894]: Failed password for r.r from 60.185.110.140 port 42279 ssh2
Sep  7 11:10:40 econome sshd[8894]: Failed password for r.r from 60.185.110.140 port 42279 ssh2
Sep  7 11:10:40 econome sshd[8894]: Disconnecting: Too many authentication failures for r.r from 60.185.110.140 port 42279 ssh2 [preauth]
Sep  7 11:10:40 econome sshd[8894]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.185........
-------------------------------
2019-09-07 20:57:18
118.25.7.83 attackspambots
Sep  7 14:14:39 vps01 sshd[13287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.7.83
Sep  7 14:14:41 vps01 sshd[13287]: Failed password for invalid user qwerty from 118.25.7.83 port 46220 ssh2
2019-09-07 20:26:37

Recently Reported IPs

222.252.25.116 72.232.3.87 58.18.32.27 2001:4800:7818:103:be76:4eff:fe05:8efe
0.0.0.251 198.255.110.138 172.247.197.160 88.150.180.178
90.151.82.236 82.138.27.46 134.249.141.24 106.13.107.51
85.118.108.25 82.200.168.91 5.189.128.90 41.65.193.18
118.70.124.40 113.161.212.26 77.32.167.92 123.1.194.94