Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.139.49.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.139.49.234.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 15:40:52 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 234.49.139.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.49.139.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.87.99.68 attackbotsspam
Jun 28 08:14:44 icinga sshd[29959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.87.99.68
Jun 28 08:14:47 icinga sshd[29959]: Failed password for invalid user ryan from 77.87.99.68 port 48216 ssh2
...
2019-06-28 16:11:25
118.170.35.234 attackspam
37215/tcp 37215/tcp 37215/tcp...
[2019-06-26/27]5pkt,1pt.(tcp)
2019-06-28 16:09:48
115.85.17.158 attack
445/tcp 445/tcp 445/tcp...
[2019-05-03/06-28]16pkt,1pt.(tcp)
2019-06-28 16:46:09
106.0.36.114 attackbots
Triggered by Fail2Ban at Vostok web server
2019-06-28 16:53:03
49.231.7.50 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-04/06-28]12pkt,1pt.(tcp)
2019-06-28 16:42:17
182.61.170.251 attackspambots
Jun 28 08:25:20 mail sshd\[4508\]: Invalid user office from 182.61.170.251 port 51448
Jun 28 08:25:20 mail sshd\[4508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.170.251
...
2019-06-28 16:17:28
68.48.240.245 attackbots
Jun 28 07:57:41 giegler sshd[4761]: Invalid user admin from 68.48.240.245 port 45922
2019-06-28 17:02:23
202.69.66.130 attack
Reported by AbuseIPDB proxy server.
2019-06-28 16:13:33
115.186.156.164 attackbotsspam
Jun 28 07:12:28 [host] sshd[9004]: Invalid user admin from 115.186.156.164
Jun 28 07:12:28 [host] sshd[9004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.156.164
Jun 28 07:12:31 [host] sshd[9004]: Failed password for invalid user admin from 115.186.156.164 port 36234 ssh2
2019-06-28 16:35:45
91.226.152.116 attackbotsspam
445/tcp 445/tcp
[2019-06-19/28]2pkt
2019-06-28 16:43:16
116.99.183.13 attackbotsspam
Jun 28 07:03:15 mxgate1 sshd[593]: Invalid user admin from 116.99.183.13 port 53932
Jun 28 07:03:15 mxgate1 sshd[593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.99.183.13
Jun 28 07:03:17 mxgate1 sshd[593]: Failed password for invalid user admin from 116.99.183.13 port 53932 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.99.183.13
2019-06-28 16:41:40
131.247.11.245 attackbots
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: Connection from 131.247.11.245 port 35682 on 172.30.0.184 port 22
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: reveeclipse mapping checking getaddrinfo for enb237-01.forest.usf.edu [131.247.11.245] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: Invalid user teamspeak from 131.247.11.245
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.247.11.245 
Jun 27 20:07:10 sanyalnet-awsem3-1 sshd[3396]: Failed password for invalid user teamspeak from 131.247.11.245 port 35682 ssh2
Jun 27 20:07:10 sanyalnet-awsem3-1 sshd[3396]: Received disconnect from 131.247.11.245: 11: Bye Bye [preauth]
Jun 27 20:08:50 sanyalnet-awsem3-1 sshd[3455]: Connection from 131.247.11.245 port 55564 on 172.30.0.184 port 22
Jun 27 20:08:51 sanyalnet-awsem3-1 sshd[3455]: reveeclipse mapping checking getaddrinfo for enb237-01.forest.us........
-------------------------------
2019-06-28 16:58:03
88.85.94.227 attack
Web Attack: Fake Tech Support Domains 3
2019-06-28 16:43:40
185.36.81.165 attackspambots
2019-06-28T10:02:23.730374ns1.unifynetsol.net postfix/smtpd\[28441\]: warning: unknown\[185.36.81.165\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T11:03:03.932191ns1.unifynetsol.net postfix/smtpd\[1401\]: warning: unknown\[185.36.81.165\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T12:03:46.786972ns1.unifynetsol.net postfix/smtpd\[12113\]: warning: unknown\[185.36.81.165\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T13:04:32.113046ns1.unifynetsol.net postfix/smtpd\[24263\]: warning: unknown\[185.36.81.165\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T14:05:24.556095ns1.unifynetsol.net postfix/smtpd\[2622\]: warning: unknown\[185.36.81.165\]: SASL LOGIN authentication failed: authentication failure
2019-06-28 16:42:53
141.98.10.40 attack
2019-06-28T10:07:02.627139ns1.unifynetsol.net postfix/smtpd\[28441\]: warning: unknown\[141.98.10.40\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T11:04:09.634600ns1.unifynetsol.net postfix/smtpd\[1405\]: warning: unknown\[141.98.10.40\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T12:01:19.847094ns1.unifynetsol.net postfix/smtpd\[10577\]: warning: unknown\[141.98.10.40\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T12:58:21.507750ns1.unifynetsol.net postfix/smtpd\[24263\]: warning: unknown\[141.98.10.40\]: SASL LOGIN authentication failed: authentication failure
2019-06-28T13:55:17.424830ns1.unifynetsol.net postfix/smtpd\[31312\]: warning: unknown\[141.98.10.40\]: SASL LOGIN authentication failed: authentication failure
2019-06-28 16:45:02

Recently Reported IPs

44.37.162.97 50.64.162.70 53.143.24.80 132.29.9.143
166.57.153.254 203.206.94.199 80.201.200.14 203.95.93.134
89.192.178.57 70.204.15.16 198.143.98.151 168.255.186.61
238.24.205.32 250.203.239.132 32.142.198.85 211.241.160.6
62.81.143.236 164.196.125.128 240.52.183.66 39.224.221.50