Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.244.144.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.244.144.39.			IN	A

;; AUTHORITY SECTION:
.			327	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060200 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 02 15:42:14 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 39.144.244.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.144.244.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
102.65.90.61 attackbots
Sep 15 01:02:27 ssh2 sshd[55297]: User root from 102-65-90-61.ftth.web.africa not allowed because not listed in AllowUsers
Sep 15 01:02:27 ssh2 sshd[55297]: Failed password for invalid user root from 102.65.90.61 port 56100 ssh2
Sep 15 01:02:28 ssh2 sshd[55297]: Connection closed by invalid user root 102.65.90.61 port 56100 [preauth]
...
2020-09-15 20:41:11
190.81.175.66 attackbots
Repeated RDP login failures. Last user: Manager2
2020-09-15 21:08:13
120.31.202.107 attackspam
RDP Bruteforce
2020-09-15 21:14:22
185.216.140.185 attackbotsspam
RDP Brute-Force (honeypot 1)
2020-09-15 21:09:50
142.93.130.58 attack
Sep 15 13:58:41 jane sshd[29119]: Failed password for root from 142.93.130.58 port 42294 ssh2
...
2020-09-15 20:49:16
195.54.167.152 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-15T05:39:34Z and 2020-09-15T07:27:14Z
2020-09-15 20:55:17
176.32.132.76 attackbots
Unauthorized connection attempt from IP address 176.32.132.76 on Port 445(SMB)
2020-09-15 20:42:32
91.39.167.24 attackspam
SSH/22 MH Probe, BF, Hack -
2020-09-15 21:03:20
124.156.139.95 attackbots
Sep 15 10:00:18 vm0 sshd[12541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.139.95
Sep 15 10:00:20 vm0 sshd[12541]: Failed password for invalid user admin from 124.156.139.95 port 33535 ssh2
...
2020-09-15 21:02:18
190.21.50.199 attackspam
Invalid user sk from 190.21.50.199 port 45964
2020-09-15 21:09:01
184.71.122.210 attack
Repeated RDP login failures. Last user: Test
2020-09-15 21:10:25
51.68.224.53 attack
Sep 15 08:20:06 NPSTNNYC01T sshd[22986]: Failed password for root from 51.68.224.53 port 60690 ssh2
Sep 15 08:24:04 NPSTNNYC01T sshd[23226]: Failed password for root from 51.68.224.53 port 43508 ssh2
...
2020-09-15 20:40:12
133.208.149.23 attackbots
Repeated RDP login failures. Last user: Test1
2020-09-15 21:11:39
198.55.127.248 attack
ssh brute force
2020-09-15 20:37:55
218.92.0.172 attackbots
Sep 15 14:32:28 sso sshd[10280]: Failed password for root from 218.92.0.172 port 38140 ssh2
Sep 15 14:32:31 sso sshd[10280]: Failed password for root from 218.92.0.172 port 38140 ssh2
...
2020-09-15 20:37:25

Recently Reported IPs

120.29.108.204 156.16.222.198 166.170.220.240 195.54.166.128
91.56.210.9 49.233.183.15 8.208.78.99 23.128.192.91
169.255.132.163 163.77.150.133 218.172.161.136 3.107.42.176
3.254.235.47 161.2.30.20 41.249.204.254 119.236.195.72
102.41.208.141 109.208.49.72 104.23.102.92 182.77.151.178