Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.84.215.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.84.215.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 08:46:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.215.84.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.215.84.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.150.220.230 attackbots
Aug 11 16:51:40 [host] sshd[8240]: Invalid user sangley_xmb1 from 218.150.220.230
Aug 11 16:51:40 [host] sshd[8240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.220.230
Aug 11 16:51:42 [host] sshd[8240]: Failed password for invalid user sangley_xmb1 from 218.150.220.230 port 45300 ssh2
2019-08-11 23:13:40
81.22.45.148 attack
Aug 11 16:55:37 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48139 PROTO=TCP SPT=44617 DPT=8068 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-11 23:19:09
123.206.51.192 attackspambots
2019-08-11T11:36:22.170085abusebot-8.cloudsearch.cf sshd\[24596\]: Invalid user ges from 123.206.51.192 port 38808
2019-08-11 22:51:25
83.12.198.38 attackspambots
Aug 11 05:05:39 TORMINT sshd\[5507\]: Invalid user mythtv from 83.12.198.38
Aug 11 05:05:39 TORMINT sshd\[5507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.198.38
Aug 11 05:05:41 TORMINT sshd\[5507\]: Failed password for invalid user mythtv from 83.12.198.38 port 45781 ssh2
...
2019-08-11 23:06:54
37.120.146.40 attackbotsspam
fail2ban
2019-08-11 22:53:35
114.112.81.181 attackbotsspam
Aug 11 10:03:58 SilenceServices sshd[885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.112.81.181
Aug 11 10:04:00 SilenceServices sshd[885]: Failed password for invalid user dw from 114.112.81.181 port 43476 ssh2
Aug 11 10:08:42 SilenceServices sshd[4190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.112.81.181
2019-08-11 23:12:35
200.189.12.124 attack
failed_logins
2019-08-11 23:31:02
85.193.195.236 attackbots
[ES hit] Tried to deliver spam.
2019-08-11 22:58:54
79.190.119.50 attackbotsspam
Aug 11 12:31:00 OPSO sshd\[3364\]: Invalid user uftp from 79.190.119.50 port 53562
Aug 11 12:31:00 OPSO sshd\[3364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.119.50
Aug 11 12:31:02 OPSO sshd\[3364\]: Failed password for invalid user uftp from 79.190.119.50 port 53562 ssh2
Aug 11 12:35:28 OPSO sshd\[4141\]: Invalid user nxuser from 79.190.119.50 port 47168
Aug 11 12:35:28 OPSO sshd\[4141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.119.50
2019-08-11 23:15:03
51.38.150.105 attack
Automatic report - Banned IP Access
2019-08-11 23:27:46
111.67.205.103 attackbotsspam
Aug 11 11:03:34 eventyay sshd[7530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.205.103
Aug 11 11:03:36 eventyay sshd[7530]: Failed password for invalid user cr from 111.67.205.103 port 41870 ssh2
Aug 11 11:05:44 eventyay sshd[8145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.205.103
...
2019-08-11 22:44:22
123.157.112.5 attackspambots
23/tcp
[2019-08-11]1pkt
2019-08-11 23:10:52
203.44.227.130 attack
Aug 11 17:11:28 mail sshd\[15040\]: Invalid user hadoop from 203.44.227.130
Aug 11 17:11:28 mail sshd\[15040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.44.227.130
Aug 11 17:11:31 mail sshd\[15040\]: Failed password for invalid user hadoop from 203.44.227.130 port 53031 ssh2
...
2019-08-11 23:40:26
221.226.11.218 attack
Aug 11 11:35:39 vps65 sshd\[15060\]: Invalid user herbert from 221.226.11.218 port 35153
Aug 11 11:35:39 vps65 sshd\[15060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.11.218
...
2019-08-11 22:49:53
1.161.246.83 attackbots
23/tcp
[2019-08-11]1pkt
2019-08-11 23:13:09

Recently Reported IPs

47.128.65.72 184.31.109.11 181.172.45.149 250.133.225.120
121.32.16.61 49.101.157.133 226.133.187.33 20.120.0.82
229.42.177.224 193.37.4.170 220.248.110.108 162.162.201.195
81.246.191.57 3.153.54.233 123.61.237.226 52.171.33.103
241.116.229.0 207.253.242.251 132.16.79.210 61.158.32.225