Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.168.189.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.168.189.44.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022050700 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 07 17:41:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
44.189.168.139.in-addr.arpa domain name pointer cpe-139-168-189-44.nb07.nsw.asp.telstra.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.189.168.139.in-addr.arpa	name = cpe-139-168-189-44.nb07.nsw.asp.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.132.22.78 attackspambots
Invalid user test from 116.132.22.78 port 53972
2019-09-13 10:52:09
80.211.113.144 attackspam
Sep 12 21:43:40 aat-srv002 sshd[27627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Sep 12 21:43:41 aat-srv002 sshd[27627]: Failed password for invalid user wocloud from 80.211.113.144 port 46900 ssh2
Sep 12 21:50:22 aat-srv002 sshd[27756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Sep 12 21:50:24 aat-srv002 sshd[27756]: Failed password for invalid user minecraft from 80.211.113.144 port 35204 ssh2
...
2019-09-13 11:00:07
180.182.47.132 attackspam
Invalid user benson from 180.182.47.132 port 32982
2019-09-13 10:42:21
115.226.242.76 attack
Invalid user admin from 115.226.242.76 port 47444
2019-09-13 10:26:04
180.138.65.133 attackspambots
Invalid user admin from 180.138.65.133 port 46012
2019-09-13 10:15:16
123.189.21.81 attack
Invalid user user from 123.189.21.81 port 6351
2019-09-13 10:24:57
206.189.233.154 attackspam
Invalid user guest from 206.189.233.154 port 56470
2019-09-13 10:39:03
125.44.172.42 attackbotsspam
Invalid user admin from 125.44.172.42 port 54978
2019-09-13 10:22:59
125.99.58.98 attack
Sep 13 03:58:01 meumeu sshd[25899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.58.98 
Sep 13 03:58:03 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
Sep 13 03:58:06 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
Sep 13 03:58:09 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
...
2019-09-13 10:48:55
150.95.24.185 attackbots
Invalid user admin from 150.95.24.185 port 38170
2019-09-13 10:19:14
124.156.103.34 attack
Invalid user test from 124.156.103.34 port 50514
2019-09-13 10:49:58
219.77.111.54 attack
Invalid user admin from 219.77.111.54 port 53037
2019-09-13 10:10:16
200.146.119.208 attackbotsspam
Sep 13 04:01:59 ArkNodeAT sshd\[3130\]: Invalid user sysadmin from 200.146.119.208
Sep 13 04:01:59 ArkNodeAT sshd\[3130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.119.208
Sep 13 04:02:01 ArkNodeAT sshd\[3130\]: Failed password for invalid user sysadmin from 200.146.119.208 port 64777 ssh2
2019-09-13 10:12:25
211.22.222.251 attackbotsspam
Invalid user hadoop from 211.22.222.251 port 55259
2019-09-13 10:38:13
37.114.160.22 attackspambots
Invalid user admin from 37.114.160.22 port 57680
2019-09-13 10:36:08

Recently Reported IPs

48.53.213.34 203.15.202.65 62.24.244.152 202.227.94.191
210.187.77.248 84.49.92.82 172.206.80.1 203.247.147.153
219.76.169.228 148.199.137.202 156.32.210.64 143.131.61.218
200.88.147.152 83.103.71.47 175.1.225.45 172.106.163.246
0.240.8.222 177.202.64.148 242.233.237.189 52.186.141.137