Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.1.99.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.1.99.139.			IN	A

;; AUTHORITY SECTION:
.			322	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 10:57:39 CST 2022
;; MSG SIZE  rcvd: 105
Host info
139.99.1.109.in-addr.arpa domain name pointer 139.99.1.109.rev.sfr.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.99.1.109.in-addr.arpa	name = 139.99.1.109.rev.sfr.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.41.229.71 attack
SMB Server BruteForce Attack
2019-08-03 10:19:17
129.213.156.171 attackbotsspam
[ssh] SSH attack
2019-08-03 09:53:11
115.78.232.152 attackbotsspam
Aug  2 21:21:58 v22018076622670303 sshd\[7810\]: Invalid user regis from 115.78.232.152 port 63010
Aug  2 21:21:58 v22018076622670303 sshd\[7810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.232.152
Aug  2 21:22:00 v22018076622670303 sshd\[7810\]: Failed password for invalid user regis from 115.78.232.152 port 63010 ssh2
...
2019-08-03 09:40:52
118.167.195.164 attack
23/tcp
[2019-08-02]1pkt
2019-08-03 09:51:17
42.225.254.109 attackbotsspam
Caught in portsentry honeypot
2019-08-03 10:04:27
51.68.72.174 attackbotsspam
Port scan on 2 port(s): 139 445
2019-08-03 09:36:18
94.249.1.1 attack
23/tcp
[2019-08-02]1pkt
2019-08-03 10:20:00
36.75.107.252 attackbots
Aug  3 02:43:50 meumeu sshd[31611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.75.107.252 
Aug  3 02:43:52 meumeu sshd[31611]: Failed password for invalid user elly from 36.75.107.252 port 25901 ssh2
Aug  3 02:49:00 meumeu sshd[32258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.75.107.252 
...
2019-08-03 10:07:09
209.97.170.94 attackbots
Aug  3 05:10:00 server sshd\[13155\]: Invalid user imre from 209.97.170.94 port 53568
Aug  3 05:10:00 server sshd\[13155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.170.94
Aug  3 05:10:02 server sshd\[13155\]: Failed password for invalid user imre from 209.97.170.94 port 53568 ssh2
Aug  3 05:16:30 server sshd\[11868\]: User root from 209.97.170.94 not allowed because listed in DenyUsers
Aug  3 05:16:30 server sshd\[11868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.170.94  user=root
2019-08-03 10:21:36
121.165.66.226 attack
2019-08-03T01:51:13.737471abusebot-8.cloudsearch.cf sshd\[24854\]: Invalid user common from 121.165.66.226 port 46618
2019-08-03 10:02:42
123.206.67.55 attackbotsspam
Invalid user ftpuser from 123.206.67.55 port 42313
2019-08-03 09:42:16
138.97.224.162 attackbotsspam
8080/tcp
[2019-08-02]1pkt
2019-08-03 10:22:45
185.220.101.20 attack
SSH bruteforce
2019-08-03 09:40:24
77.247.181.163 attackbots
Aug  3 01:49:58 vpn01 sshd\[27771\]: Invalid user user from 77.247.181.163
Aug  3 01:49:58 vpn01 sshd\[27771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.163
Aug  3 01:50:00 vpn01 sshd\[27771\]: Failed password for invalid user user from 77.247.181.163 port 11876 ssh2
2019-08-03 09:38:13
89.43.156.91 attack
port scan and connect, tcp 22 (ssh)
2019-08-03 09:47:18

Recently Reported IPs

108.62.63.98 109.104.89.128 109.106.248.29 109.104.255.196
109.106.250.5 109.106.250.226 87.20.244.131 109.125.133.210
109.124.81.93 109.125.175.106 109.125.161.199 109.126.5.181
109.126.212.164 109.126.255.53 109.125.153.174 109.130.160.71
109.158.212.73 109.146.60.176 109.15.228.71 109.160.7.244