Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.139.55.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3025
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;144.139.55.124.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 06 11:10:07 CST 2019
;; MSG SIZE  rcvd: 118
Host info
124.55.139.144.in-addr.arpa domain name pointer chr1961583.lnk.telstra.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
124.55.139.144.in-addr.arpa	name = chr1961583.lnk.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.193.96 attackbots
Invalid user kelly from 106.12.193.96 port 33990
2020-05-13 13:12:40
106.54.66.122 attackbotsspam
$f2bV_matches
2020-05-13 12:45:55
218.92.0.165 attack
May 13 06:36:20 minden010 sshd[13685]: Failed password for root from 218.92.0.165 port 22044 ssh2
May 13 06:36:30 minden010 sshd[13685]: Failed password for root from 218.92.0.165 port 22044 ssh2
May 13 06:36:33 minden010 sshd[13685]: Failed password for root from 218.92.0.165 port 22044 ssh2
May 13 06:36:33 minden010 sshd[13685]: error: maximum authentication attempts exceeded for root from 218.92.0.165 port 22044 ssh2 [preauth]
...
2020-05-13 12:38:29
45.95.168.212 attackspambots
Fail2Ban Ban Triggered
2020-05-13 12:40:00
67.70.142.247 attackspambots
2020-05-12T23:33:48.8959901495-001 sshd[6098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=shbkpq4068w-lp130-01-67-70-142-247.dsl.bell.ca
2020-05-12T23:33:48.8928321495-001 sshd[6098]: Invalid user teampspeak3 from 67.70.142.247 port 40906
2020-05-12T23:33:50.8895521495-001 sshd[6098]: Failed password for invalid user teampspeak3 from 67.70.142.247 port 40906 ssh2
2020-05-12T23:37:22.0719071495-001 sshd[6260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=shbkpq4068w-lp130-01-67-70-142-247.dsl.bell.ca  user=root
2020-05-12T23:37:23.7749691495-001 sshd[6260]: Failed password for root from 67.70.142.247 port 44826 ssh2
2020-05-12T23:40:55.1990241495-001 sshd[6381]: Invalid user xr from 67.70.142.247 port 48750
...
2020-05-13 13:11:50
104.236.228.46 attackspam
May 13 07:03:30 vps639187 sshd\[15985\]: Invalid user trump from 104.236.228.46 port 54976
May 13 07:03:30 vps639187 sshd\[15985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.228.46
May 13 07:03:32 vps639187 sshd\[15985\]: Failed password for invalid user trump from 104.236.228.46 port 54976 ssh2
...
2020-05-13 13:06:08
61.182.232.38 attack
May 13 05:49:52 server sshd[62174]: Failed password for invalid user sysman from 61.182.232.38 port 47216 ssh2
May 13 06:09:18 server sshd[11540]: Failed password for invalid user web from 61.182.232.38 port 59282 ssh2
May 13 06:13:49 server sshd[14710]: Failed password for invalid user asif from 61.182.232.38 port 54078 ssh2
2020-05-13 12:37:25
138.68.176.38 attack
Invalid user logan from 138.68.176.38 port 46396
2020-05-13 13:13:01
132.232.30.87 attackbotsspam
May 13 03:50:10 ns3033917 sshd[9785]: Invalid user macintosh from 132.232.30.87 port 51754
May 13 03:50:12 ns3033917 sshd[9785]: Failed password for invalid user macintosh from 132.232.30.87 port 51754 ssh2
May 13 03:59:06 ns3033917 sshd[9871]: Invalid user shelley from 132.232.30.87 port 34500
...
2020-05-13 12:50:12
218.92.0.145 attackspambots
$f2bV_matches
2020-05-13 12:41:31
5.181.50.75 attack
Fail2Ban Ban Triggered
HTTP Attempted Bot Registration
2020-05-13 12:45:14
94.102.51.78 attackbotsspam
$lgm
2020-05-13 12:56:55
222.186.42.137 attackspambots
May 13 09:39:56 gw1 sshd[18684]: Failed password for root from 222.186.42.137 port 36744 ssh2
May 13 09:39:58 gw1 sshd[18684]: Failed password for root from 222.186.42.137 port 36744 ssh2
...
2020-05-13 12:40:30
103.99.3.67 attack
Honeypot hit.
2020-05-13 13:20:48
14.183.203.249 attackbotsspam
Unauthorised access (May 13) SRC=14.183.203.249 LEN=52 TTL=116 ID=11163 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-13 13:03:26

Recently Reported IPs

125.105.102.255 183.171.98.188 117.50.49.74 179.63.191.0
177.92.240.236 125.16.149.246 79.137.3.130 191.53.57.238
171.139.210.114 150.64.29.99 102.236.88.26 69.30.209.181
232.26.32.215 52.245.254.11 36.76.144.113 145.229.67.75
79.114.57.144 85.192.128.44 163.201.21.85 229.35.109.2