Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Araruama

Region: Rio de Janeiro

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.82.44.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59731
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.82.44.244.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 10 16:43:47 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 244.44.82.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 244.44.82.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.216.249.170 attack
Aug 17 23:55:10 srv206 sshd[12679]: Invalid user web from 178.216.249.170
...
2019-08-18 07:15:22
183.166.99.234 attack
SpamReport
2019-08-18 07:24:20
91.218.67.116 attackspam
2019-08-17T23:36:54.738531abusebot-4.cloudsearch.cf sshd\[11328\]: Invalid user xo from 91.218.67.116 port 38009
2019-08-18 07:43:51
75.50.59.234 attack
SSH Brute-Forcing (ownc)
2019-08-18 07:25:23
202.29.236.131 attackspam
SSH Bruteforce attempt
2019-08-18 07:05:04
94.176.76.188 attackspambots
(Aug 17)  LEN=40 TTL=244 ID=8565 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=24859 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=9586 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=30744 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=36633 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=56022 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=35437 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=3502 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=40587 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 17)  LEN=40 TTL=244 ID=64431 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 16)  LEN=40 TTL=244 ID=51776 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 16)  LEN=40 TTL=244 ID=60896 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 16)  LEN=40 TTL=244 ID=40302 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 16)  LEN=40 TTL=244 ID=38734 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 16)  LEN=40 TTL=244 ID=27327 DF TCP DPT=23 WINDOW=14600 SYN...
2019-08-18 07:07:11
203.77.234.92 attack
2019-08-17T22:27:24.687517abusebot-8.cloudsearch.cf sshd\[475\]: Invalid user 123123 from 203.77.234.92 port 44096
2019-08-18 07:22:13
89.36.220.145 attackbotsspam
Aug 17 13:26:53 php2 sshd\[8206\]: Invalid user jd from 89.36.220.145
Aug 17 13:26:53 php2 sshd\[8206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pbsincusa.com
Aug 17 13:26:54 php2 sshd\[8206\]: Failed password for invalid user jd from 89.36.220.145 port 37465 ssh2
Aug 17 13:30:47 php2 sshd\[8554\]: Invalid user ma from 89.36.220.145
Aug 17 13:30:47 php2 sshd\[8554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pbsincusa.com
2019-08-18 07:45:34
45.60.204.9 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-18 07:27:31
66.70.188.25 attack
Triggered by Fail2Ban at Vostok web server
2019-08-18 07:46:35
45.55.84.16 attack
Aug 17 19:25:00 ny01 sshd[24089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.84.16
Aug 17 19:25:03 ny01 sshd[24089]: Failed password for invalid user cuan from 45.55.84.16 port 58359 ssh2
Aug 17 19:29:36 ny01 sshd[24499]: Failed password for root from 45.55.84.16 port 53899 ssh2
2019-08-18 07:36:03
36.75.78.75 attackbots
firewall-block, port(s): 445/tcp
2019-08-18 07:21:50
62.102.148.68 attackspambots
Aug 18 01:16:39 lnxded63 sshd[15229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.68
Aug 18 01:16:39 lnxded63 sshd[15229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.68
2019-08-18 07:31:57
210.102.196.180 attackbots
Aug 18 01:39:30 [host] sshd[24891]: Invalid user ftpuser from 210.102.196.180
Aug 18 01:39:30 [host] sshd[24891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.102.196.180
Aug 18 01:39:32 [host] sshd[24891]: Failed password for invalid user ftpuser from 210.102.196.180 port 51382 ssh2
2019-08-18 07:43:04
172.81.237.242 attackspambots
Aug 17 20:16:54 mail1 sshd\[1450\]: Invalid user tester from 172.81.237.242 port 53860
Aug 17 20:16:54 mail1 sshd\[1450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.237.242
Aug 17 20:16:56 mail1 sshd\[1450\]: Failed password for invalid user tester from 172.81.237.242 port 53860 ssh2
Aug 17 20:30:05 mail1 sshd\[7757\]: Invalid user victor from 172.81.237.242 port 52316
Aug 17 20:30:05 mail1 sshd\[7757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.237.242
...
2019-08-18 07:19:01

Recently Reported IPs

4.100.230.120 31.148.168.109 156.47.24.86 45.181.31.252
201.208.227.102 201.44.71.82 192.95.8.76 49.113.7.102
180.15.67.165 182.96.170.128 94.64.228.46 128.196.210.193
169.47.60.66 123.151.34.210 113.232.236.160 111.184.68.193
204.46.57.134 108.202.116.66 193.180.125.106 68.138.12.61