Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.44.153.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.44.153.49.			IN	A

;; AUTHORITY SECTION:
.			472	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010200 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 01:50:22 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 49.153.44.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.153.44.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.138.74.211 attack
SpamScore above: 10.0
2020-08-11 20:26:12
59.120.189.234 attackspam
$f2bV_matches
2020-08-11 20:27:06
177.206.236.18 attackspambots
20/8/11@08:14:43: FAIL: Alarm-Network address from=177.206.236.18
20/8/11@08:14:43: FAIL: Alarm-Network address from=177.206.236.18
...
2020-08-11 20:32:35
222.186.180.8 attackspambots
Aug 11 09:24:29 firewall sshd[32199]: Failed password for root from 222.186.180.8 port 32028 ssh2
Aug 11 09:24:32 firewall sshd[32199]: Failed password for root from 222.186.180.8 port 32028 ssh2
Aug 11 09:24:36 firewall sshd[32199]: Failed password for root from 222.186.180.8 port 32028 ssh2
...
2020-08-11 20:27:29
218.92.0.219 attackbotsspam
Aug 11 08:28:50 ny01 sshd[28463]: Failed password for root from 218.92.0.219 port 29854 ssh2
Aug 11 08:29:05 ny01 sshd[28490]: Failed password for root from 218.92.0.219 port 63450 ssh2
Aug 11 08:29:09 ny01 sshd[28490]: Failed password for root from 218.92.0.219 port 63450 ssh2
2020-08-11 20:29:39
91.241.19.15 attack
[H1] Blocked by UFW
2020-08-11 20:31:43
169.255.148.18 attackbotsspam
$f2bV_matches
2020-08-11 19:55:54
42.114.207.169 attackspambots
Unauthorized connection attempt from IP address 42.114.207.169 on Port 445(SMB)
2020-08-11 20:11:25
108.51.98.144 attackbotsspam
Automatic report - Port Scan Attack
2020-08-11 19:52:49
8.208.76.187 attack
Aug 11 14:41:14 journals sshd\[57689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.208.76.187  user=root
Aug 11 14:41:16 journals sshd\[57689\]: Failed password for root from 8.208.76.187 port 51018 ssh2
Aug 11 14:45:26 journals sshd\[58140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.208.76.187  user=root
Aug 11 14:45:28 journals sshd\[58140\]: Failed password for root from 8.208.76.187 port 35604 ssh2
Aug 11 14:49:48 journals sshd\[58593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.208.76.187  user=root
...
2020-08-11 20:17:02
114.5.192.3 attack
445/tcp 1433/tcp...
[2020-06-16/08-11]9pkt,2pt.(tcp)
2020-08-11 19:55:27
111.229.53.186 attackspam
sshd jail - ssh hack attempt
2020-08-11 20:04:57
45.79.149.62 attackbots
Aug 11 05:38:37 lnxmysql61 sshd[23961]: Failed password for root from 45.79.149.62 port 35626 ssh2
Aug 11 05:42:28 lnxmysql61 sshd[25348]: Failed password for root from 45.79.149.62 port 49234 ssh2
2020-08-11 20:12:55
101.207.113.73 attackbotsspam
$f2bV_matches
2020-08-11 20:30:08
49.234.10.48 attackspambots
Aug 11 05:39:17 vps1 sshd[21190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.48  user=root
Aug 11 05:39:19 vps1 sshd[21190]: Failed password for invalid user root from 49.234.10.48 port 54536 ssh2
Aug 11 05:41:45 vps1 sshd[21227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.48  user=root
Aug 11 05:41:46 vps1 sshd[21227]: Failed password for invalid user root from 49.234.10.48 port 52312 ssh2
Aug 11 05:44:08 vps1 sshd[21565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.48  user=root
Aug 11 05:44:09 vps1 sshd[21565]: Failed password for invalid user root from 49.234.10.48 port 50096 ssh2
...
2020-08-11 20:01:13

Recently Reported IPs

57.146.105.19 36.90.89.154 221.121.135.68 95.90.252.210
112.221.33.82 212.237.46.133 218.152.41.49 135.190.61.33
180.100.196.182 4.164.48.242 186.96.78.1 214.88.65.3
78.109.78.176 176.76.187.147 69.207.186.96 95.7.54.2
69.175.64.210 8.25.22.20 119.219.124.224 63.234.115.71