Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.31.139.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.31.139.244.			IN	A

;; AUTHORITY SECTION:
.			175	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 20:07:07 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 244.139.31.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.139.31.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.182.196.178 attackbots
Invalid user demo from 217.182.196.178 port 48324
2019-11-14 21:30:35
46.101.163.220 attack
Invalid user ubuntu from 46.101.163.220 port 32978
2019-11-14 21:42:27
121.131.36.92 attack
UTC: 2019-11-13 port: 123/udp
2019-11-14 21:47:13
61.219.11.153 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 21:44:36
122.233.96.185 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/122.233.96.185/ 
 
 CN - 1H : (1135)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 122.233.96.185 
 
 CIDR : 122.232.0.0/14 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 48 
  3H - 94 
  6H - 168 
 12H - 325 
 24H - 530 
 
 DateTime : 2019-11-14 13:21:45 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 21:40:04
83.97.20.203 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 3128 proto: TCP cat: Misc Attack
2019-11-14 21:37:56
101.231.86.36 attack
Invalid user diet from 101.231.86.36 port 49362
2019-11-14 22:00:40
184.105.247.247 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 21:41:04
188.213.49.60 attackspambots
Automatic report - Banned IP Access
2019-11-14 21:31:28
218.93.33.52 attackbots
Nov 14 01:46:20 TORMINT sshd\[17682\]: Invalid user ciel from 218.93.33.52
Nov 14 01:46:20 TORMINT sshd\[17682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.93.33.52
Nov 14 01:46:21 TORMINT sshd\[17682\]: Failed password for invalid user ciel from 218.93.33.52 port 45806 ssh2
...
2019-11-14 22:05:35
223.207.250.185 attackbots
Unauthorised access (Nov 14) SRC=223.207.250.185 LEN=52 TTL=111 ID=16409 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-14 21:39:29
89.235.225.85 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/89.235.225.85/ 
 
 EE - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EE 
 NAME ASN : ASN8728 
 
 IP : 89.235.225.85 
 
 CIDR : 89.235.192.0/18 
 
 PREFIX COUNT : 13 
 
 UNIQUE IP COUNT : 50688 
 
 
 ATTACKS DETECTED ASN8728 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-14 10:27:39 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 21:36:33
193.32.160.150 attackspam
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.151\]\>
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.151\]\>
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.151\]\>
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\
2019-11-14 21:50:08
37.59.158.100 attack
Nov 14 09:19:55 server sshd\[11346\]: Failed password for invalid user redweb from 37.59.158.100 port 54730 ssh2
Nov 14 15:26:40 server sshd\[12058\]: Invalid user ftpuser from 37.59.158.100
Nov 14 15:26:40 server sshd\[12058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-37-59-158.eu 
Nov 14 15:26:42 server sshd\[12058\]: Failed password for invalid user ftpuser from 37.59.158.100 port 55128 ssh2
Nov 14 15:37:11 server sshd\[15557\]: Invalid user web from 37.59.158.100
Nov 14 15:37:11 server sshd\[15557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-37-59-158.eu 
...
2019-11-14 21:53:56
104.42.159.141 attackbotsspam
Invalid user matwork from 104.42.159.141 port 6080
2019-11-14 22:02:06

Recently Reported IPs

136.196.53.164 162.241.26.27 162.241.253.207 162.241.26.218
162.241.254.203 162.241.254.249 162.241.253.30 162.241.253.78
162.241.253.201 162.241.253.54 162.241.253.72 162.241.253.93
162.241.26.10 162.241.27.10 162.241.27.12 162.241.27.32
162.241.26.39 162.241.29.242 162.241.27.129 162.241.27.151