Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: V6Yun (Beijing) Network Co. Ltd

Hostname: unknown

Organization: unknown

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attack
Aug 28 10:48:09 webhost01 sshd[26689]: Failed password for root from 139.199.1.166 port 56142 ssh2
Aug 28 10:49:50 webhost01 sshd[26731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166
...
2020-08-28 17:27:56
attack
(sshd) Failed SSH login from 139.199.1.166 (CN/China/-): 5 in the last 3600 secs
2020-08-21 17:36:19
attackbotsspam
Jul 16 11:10:42 webhost01 sshd[29779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166
Jul 16 11:10:44 webhost01 sshd[29779]: Failed password for invalid user cx from 139.199.1.166 port 49104 ssh2
...
2020-07-16 12:22:45
attackspambots
Unauthorized connection attempt detected from IP address 139.199.1.166 to port 5493
2020-07-05 18:37:34
attack
Jun 30 18:32:21 raspberrypi sshd[15512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=root
Jun 30 18:32:23 raspberrypi sshd[15512]: Failed password for invalid user root from 139.199.1.166 port 33276 ssh2
...
2020-07-01 18:23:47
attackspambots
Invalid user ariel from 139.199.1.166 port 51608
2020-06-29 06:30:40
attackspam
unauthorized connection attempt
2020-06-28 17:29:49
attackspambots
Jun 16 05:48:40 vps687878 sshd\[13599\]: Failed password for invalid user vmc from 139.199.1.166 port 54752 ssh2
Jun 16 05:50:53 vps687878 sshd\[13702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=root
Jun 16 05:50:55 vps687878 sshd\[13702\]: Failed password for root from 139.199.1.166 port 60806 ssh2
Jun 16 05:53:07 vps687878 sshd\[14027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=root
Jun 16 05:53:08 vps687878 sshd\[14027\]: Failed password for root from 139.199.1.166 port 38418 ssh2
...
2020-06-16 13:28:10
attackbots
2020-06-10T15:03:57.4711991495-001 sshd[5026]: Failed password for invalid user gpadmin from 139.199.1.166 port 52694 ssh2
2020-06-10T15:06:16.9920791495-001 sshd[5126]: Invalid user ve from 139.199.1.166 port 38002
2020-06-10T15:06:16.9972421495-001 sshd[5126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166
2020-06-10T15:06:16.9920791495-001 sshd[5126]: Invalid user ve from 139.199.1.166 port 38002
2020-06-10T15:06:19.0336361495-001 sshd[5126]: Failed password for invalid user ve from 139.199.1.166 port 38002 ssh2
2020-06-10T15:08:41.4899431495-001 sshd[5189]: Invalid user new from 139.199.1.166 port 50406
...
2020-06-11 03:32:47
attackspam
Jun  2 07:49:48 lukav-desktop sshd\[21465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=root
Jun  2 07:49:50 lukav-desktop sshd\[21465\]: Failed password for root from 139.199.1.166 port 56926 ssh2
Jun  2 07:51:05 lukav-desktop sshd\[21490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=root
Jun  2 07:51:07 lukav-desktop sshd\[21490\]: Failed password for root from 139.199.1.166 port 44194 ssh2
Jun  2 07:52:20 lukav-desktop sshd\[21516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=root
2020-06-02 17:02:18
attackbots
fail2ban/May 16 22:44:03 h1962932 sshd[20619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=root
May 16 22:44:05 h1962932 sshd[20619]: Failed password for root from 139.199.1.166 port 34336 ssh2
May 16 22:47:57 h1962932 sshd[20735]: Invalid user cody from 139.199.1.166 port 58560
May 16 22:47:57 h1962932 sshd[20735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166
May 16 22:47:57 h1962932 sshd[20735]: Invalid user cody from 139.199.1.166 port 58560
May 16 22:47:59 h1962932 sshd[20735]: Failed password for invalid user cody from 139.199.1.166 port 58560 ssh2
2020-05-17 05:19:16
attackspam
Invalid user backuppc from 139.199.1.166 port 39656
2020-05-02 00:06:46
attack
Apr  7 00:48:12 pi sshd[15767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166 
Apr  7 00:48:13 pi sshd[15767]: Failed password for invalid user dods from 139.199.1.166 port 36390 ssh2
2020-04-07 08:16:59
attackspam
Apr  4 07:19:41 vps647732 sshd[12668]: Failed password for root from 139.199.1.166 port 47454 ssh2
...
2020-04-04 17:12:56
attack
SSH Brute-Force Attack
2020-03-21 10:03:08
attackbots
Mar 19 19:08:43 xeon sshd[48007]: Failed password for root from 139.199.1.166 port 35182 ssh2
2020-03-20 03:53:45
attackbots
Mar 11 15:30:06 josie sshd[6178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=r.r
Mar 11 15:30:08 josie sshd[6178]: Failed password for r.r from 139.199.1.166 port 35736 ssh2
Mar 11 15:30:08 josie sshd[6194]: Received disconnect from 139.199.1.166: 11: Bye Bye
Mar 11 15:33:42 josie sshd[6742]: Connection closed by 139.199.1.166
Mar 11 15:35:06 josie sshd[7020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=r.r
Mar 11 15:35:08 josie sshd[7020]: Failed password for r.r from 139.199.1.166 port 45324 ssh2
Mar 11 15:35:08 josie sshd[7023]: Received disconnect from 139.199.1.166: 11: Bye Bye
Mar 11 15:37:00 josie sshd[7347]: Invalid user akazam from 139.199.1.166
Mar 11 15:37:00 josie sshd[7347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166 
Mar 11 15:37:01 josie sshd[7347]: Failed password for i........
-------------------------------
2020-03-14 05:59:04
attack
Mar 11 15:30:06 josie sshd[6178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=r.r
Mar 11 15:30:08 josie sshd[6178]: Failed password for r.r from 139.199.1.166 port 35736 ssh2
Mar 11 15:30:08 josie sshd[6194]: Received disconnect from 139.199.1.166: 11: Bye Bye
Mar 11 15:33:42 josie sshd[6742]: Connection closed by 139.199.1.166
Mar 11 15:35:06 josie sshd[7020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166  user=r.r
Mar 11 15:35:08 josie sshd[7020]: Failed password for r.r from 139.199.1.166 port 45324 ssh2
Mar 11 15:35:08 josie sshd[7023]: Received disconnect from 139.199.1.166: 11: Bye Bye
Mar 11 15:37:00 josie sshd[7347]: Invalid user akazam from 139.199.1.166
Mar 11 15:37:00 josie sshd[7347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166 
Mar 11 15:37:01 josie sshd[7347]: Failed password for i........
-------------------------------
2020-03-13 19:42:48
Comments on same subnet:
IP Type Details Datetime
139.199.18.194 attackspam
Oct 12 10:00:06 ajax sshd[20406]: Failed password for root from 139.199.18.194 port 40928 ssh2
2020-10-12 21:33:16
139.199.170.101 attackspambots
SSH Brute-Force Attack
2020-10-12 20:57:40
139.199.18.194 attackspambots
$f2bV_matches
2020-10-12 13:04:40
139.199.170.101 attack
Oct 12 04:21:26 game-panel sshd[25338]: Failed password for root from 139.199.170.101 port 42150 ssh2
Oct 12 04:26:15 game-panel sshd[25555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.170.101
Oct 12 04:26:17 game-panel sshd[25555]: Failed password for invalid user wo from 139.199.170.101 port 38612 ssh2
2020-10-12 12:26:40
139.199.14.128 attack
Oct 10 14:59:17 con01 sshd[2993577]: Failed password for invalid user frank from 139.199.14.128 port 40462 ssh2
Oct 10 15:03:19 con01 sshd[3000067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.14.128  user=root
Oct 10 15:03:21 con01 sshd[3000067]: Failed password for root from 139.199.14.128 port 58116 ssh2
Oct 10 15:07:29 con01 sshd[3005598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.14.128  user=root
Oct 10 15:07:32 con01 sshd[3005598]: Failed password for root from 139.199.14.128 port 47538 ssh2
...
2020-10-11 03:39:28
139.199.14.128 attack
Oct 10 13:23:30 con01 sshd[2837241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.14.128  user=root
Oct 10 13:23:33 con01 sshd[2837241]: Failed password for root from 139.199.14.128 port 57812 ssh2
Oct 10 13:27:38 con01 sshd[2843894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.14.128  user=root
Oct 10 13:27:40 con01 sshd[2843894]: Failed password for root from 139.199.14.128 port 47240 ssh2
Oct 10 13:31:50 con01 sshd[2850480]: Invalid user louise from 139.199.14.128 port 36664
...
2020-10-10 19:32:09
139.199.170.101 attack
SSH brutforce
2020-10-05 07:45:26
139.199.14.128 attackspambots
Oct  4 08:46:04 pixelmemory sshd[114755]: Failed password for root from 139.199.14.128 port 55956 ssh2
Oct  4 08:49:35 pixelmemory sshd[135052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.14.128  user=root
Oct  4 08:49:37 pixelmemory sshd[135052]: Failed password for root from 139.199.14.128 port 36716 ssh2
Oct  4 08:53:15 pixelmemory sshd[139265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.14.128  user=root
Oct  4 08:53:17 pixelmemory sshd[139265]: Failed password for root from 139.199.14.128 port 45722 ssh2
...
2020-10-05 06:46:13
139.199.170.101 attack
Oct  4 13:56:05 abendstille sshd\[3409\]: Invalid user ps from 139.199.170.101
Oct  4 13:56:05 abendstille sshd\[3409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.170.101
Oct  4 13:56:06 abendstille sshd\[3409\]: Failed password for invalid user ps from 139.199.170.101 port 57362 ssh2
Oct  4 14:01:07 abendstille sshd\[7928\]: Invalid user openhab from 139.199.170.101
Oct  4 14:01:07 abendstille sshd\[7928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.170.101
...
2020-10-05 00:04:09
139.199.14.128 attackspambots
2020-10-04T03:11:55.088931Z 7474e83e79ed New connection: 139.199.14.128:39700 (172.17.0.5:2222) [session: 7474e83e79ed]
2020-10-04T03:19:53.709557Z 630dc3796768 New connection: 139.199.14.128:56288 (172.17.0.5:2222) [session: 630dc3796768]
2020-10-04 22:48:44
139.199.14.128 attackbots
2020-10-04T03:11:55.088931Z 7474e83e79ed New connection: 139.199.14.128:39700 (172.17.0.5:2222) [session: 7474e83e79ed]
2020-10-04T03:19:53.709557Z 630dc3796768 New connection: 139.199.14.128:56288 (172.17.0.5:2222) [session: 630dc3796768]
2020-10-04 14:36:18
139.199.179.248 attack
Found on   CINS badguys     / proto=6  .  srcport=51245  .  dstport=23 Telnet  .     (1015)
2020-10-04 03:27:11
139.199.179.248 attack
Found on   CINS badguys     / proto=6  .  srcport=51245  .  dstport=23 Telnet  .     (1015)
2020-10-03 19:22:51
139.199.123.152 attackbotsspam
Invalid user system from 139.199.123.152 port 48914
2020-10-02 06:47:50
139.199.119.76 attackbotsspam
Oct  1 06:48:37 Tower sshd[30637]: Connection from 139.199.119.76 port 38238 on 192.168.10.220 port 22 rdomain ""
Oct  1 06:48:38 Tower sshd[30637]: Failed password for root from 139.199.119.76 port 38238 ssh2
Oct  1 06:48:39 Tower sshd[30637]: Received disconnect from 139.199.119.76 port 38238:11: Bye Bye [preauth]
Oct  1 06:48:39 Tower sshd[30637]: Disconnected from authenticating user root 139.199.119.76 port 38238 [preauth]
2020-10-02 01:17:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.1.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.199.1.166.			IN	A

;; AUTHORITY SECTION:
.			188	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031300 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 19:42:43 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 166.1.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.1.199.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.13.14.49 attack
¯\_(ツ)_/¯
2019-06-23 17:08:13
35.201.190.210 attackbots
20 attempts against mh-ssh on ice.magehost.pro
2019-06-23 17:44:03
157.230.25.18 attackbotsspam
WP Authentication failure
2019-06-23 17:25:35
35.187.243.64 attack
Jun 23 03:46:04 ncomp sshd[3333]: Invalid user oi from 35.187.243.64
Jun 23 03:46:04 ncomp sshd[3333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.243.64
Jun 23 03:46:04 ncomp sshd[3333]: Invalid user oi from 35.187.243.64
Jun 23 03:46:05 ncomp sshd[3333]: Failed password for invalid user oi from 35.187.243.64 port 44276 ssh2
2019-06-23 17:26:58
172.96.116.149 attackspambots
" "
2019-06-23 17:37:34
186.213.147.110 attackbotsspam
Jun 23 02:55:08 this_host sshd[4636]: reveeclipse mapping checking getaddrinfo for 186.213.147.110.static.host.gvt.net.br [186.213.147.110] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 02:55:08 this_host sshd[4636]: Invalid user filter from 186.213.147.110
Jun 23 02:55:08 this_host sshd[4636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.213.147.110 
Jun 23 02:55:10 this_host sshd[4636]: Failed password for invalid user filter from 186.213.147.110 port 46347 ssh2
Jun 23 02:55:10 this_host sshd[4636]: Received disconnect from 186.213.147.110: 11: Bye Bye [preauth]
Jun 23 03:00:24 this_host sshd[4759]: reveeclipse mapping checking getaddrinfo for 186.213.147.110.static.host.gvt.net.br [186.213.147.110] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 03:00:24 this_host sshd[4759]: Invalid user heaven from 186.213.147.110
Jun 23 03:00:24 this_host sshd[4759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh r........
-------------------------------
2019-06-23 17:15:08
178.128.112.98 attackbotsspam
Jun 23 08:07:57 ns3110291 sshd\[25204\]: Invalid user ubuntu from 178.128.112.98
Jun 23 08:07:57 ns3110291 sshd\[25204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.112.98 
Jun 23 08:07:59 ns3110291 sshd\[25204\]: Failed password for invalid user ubuntu from 178.128.112.98 port 51522 ssh2
Jun 23 08:10:11 ns3110291 sshd\[25428\]: Invalid user du from 178.128.112.98
Jun 23 08:10:11 ns3110291 sshd\[25428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.112.98 
...
2019-06-23 17:22:45
125.227.236.60 attackspambots
Automatic report
2019-06-23 17:01:19
1.255.70.86 attackspambots
Unauthorized connection attempt from IP address 1.255.70.86 on Port 143(IMAP)
2019-06-23 17:29:39
37.59.36.9 attackspambots
xmlrpc attack
2019-06-23 17:45:49
119.29.135.217 attackbotsspam
frenzy
2019-06-23 17:28:04
177.154.236.166 attackspambots
SMTP-sasl brute force
...
2019-06-23 16:54:38
116.196.83.181 attackbotsspam
Automatic report - Web App Attack
2019-06-23 17:09:57
190.64.71.38 attackspambots
Brute force attempt
2019-06-23 17:25:09
118.25.40.16 attackbotsspam
Jun 23 03:42:20 nextcloud sshd\[10112\]: Invalid user cvsuser from 118.25.40.16
Jun 23 03:42:20 nextcloud sshd\[10112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.40.16
Jun 23 03:42:22 nextcloud sshd\[10112\]: Failed password for invalid user cvsuser from 118.25.40.16 port 36460 ssh2
...
2019-06-23 17:33:34

Recently Reported IPs

123.24.205.125 19.93.68.79 14.169.140.253 213.6.67.54
201.140.232.255 127.30.112.88 158.46.175.83 85.192.179.70
38.78.210.125 117.63.132.148 36.79.151.4 103.45.102.212
14.241.119.29 196.203.203.173 89.242.131.178 180.251.247.250
103.124.90.202 45.161.136.47 142.93.216.235 116.109.192.200