Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Moncton

Region: New Brunswick

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.139.244.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.139.244.50.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061401 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 15 07:13:02 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 50.244.139.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.244.139.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.236.200.254 attackspam
Invalid user elena from 116.236.200.254 port 54328
2020-07-26 18:35:11
85.238.104.235 attackbots
Dovecot Invalid User Login Attempt.
2020-07-26 18:36:29
192.171.218.107 attackspambots
Brute forcing email accounts
2020-07-26 19:00:20
104.248.149.130 attackspambots
Invalid user angelo from 104.248.149.130 port 38496
2020-07-26 19:02:31
218.60.41.136 attackspambots
Jul 26 11:49:58 mout sshd[29470]: Invalid user tempadmin from 218.60.41.136 port 46014
2020-07-26 18:27:03
165.227.182.136 attackbotsspam
Invalid user mzy from 165.227.182.136 port 41670
2020-07-26 18:40:07
49.234.124.225 attackbotsspam
Invalid user oracle from 49.234.124.225 port 51292
2020-07-26 18:43:50
106.13.40.65 attackbots
2020-07-26 02:03:22.927344-0500  localhost sshd[69930]: Failed password for invalid user web3 from 106.13.40.65 port 40836 ssh2
2020-07-26 18:41:19
147.229.136.66 attack
Jul 26 09:12:06 rush sshd[18343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.229.136.66
Jul 26 09:12:06 rush sshd[18345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.229.136.66
Jul 26 09:12:08 rush sshd[18343]: Failed password for invalid user pi from 147.229.136.66 port 50668 ssh2
...
2020-07-26 18:36:58
149.56.15.98 attack
bruteforce detected
2020-07-26 18:49:58
163.172.24.40 attackbots
Jul 26 12:55:48 vps639187 sshd\[20116\]: Invalid user samplee from 163.172.24.40 port 47114
Jul 26 12:55:48 vps639187 sshd\[20116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.24.40
Jul 26 12:55:50 vps639187 sshd\[20116\]: Failed password for invalid user samplee from 163.172.24.40 port 47114 ssh2
...
2020-07-26 19:00:52
186.74.221.210 attack
Dovecot Invalid User Login Attempt.
2020-07-26 19:01:39
42.112.205.26 attackbots
Automatic report - Port Scan Attack
2020-07-26 18:25:24
121.229.2.190 attack
Jul 26 10:20:29 xeon sshd[37246]: Failed password for invalid user conrad from 121.229.2.190 port 50792 ssh2
2020-07-26 18:38:33
54.38.65.215 attack
Invalid user portal from 54.38.65.215 port 53857
2020-07-26 18:52:15

Recently Reported IPs

95.248.69.195 208.7.169.106 71.69.204.132 100.187.55.58
47.51.46.10 179.43.216.164 179.14.81.4 96.58.107.164
168.131.246.51 186.207.105.109 70.141.245.108 102.131.76.121
41.107.180.153 174.56.104.239 172.121.161.107 18.124.172.236
190.31.155.183 106.202.16.154 199.152.217.72 252.125.223.38