Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Huawei Public Cloud Service

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
" "
2019-11-26 13:02:40
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.9.137.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46626
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.9.137.99.			IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112501 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 26 13:02:35 CST 2019
;; MSG SIZE  rcvd: 116
Host info
99.137.9.139.in-addr.arpa domain name pointer ecs-139-9-137-99.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.137.9.139.in-addr.arpa	name = ecs-139-9-137-99.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.101.46.118 attackbots
Brute force attempt
2020-06-07 18:11:32
118.24.17.128 attackspam
Jun  7 07:55:41 vmi345603 sshd[29873]: Failed password for root from 118.24.17.128 port 55874 ssh2
...
2020-06-07 17:44:48
45.143.220.13 attackspambots
Attempted to connect 3 times to port 5060 UDP
2020-06-07 17:41:25
49.68.144.254 attackbots
Email rejected due to spam filtering
2020-06-07 17:33:07
1.9.21.100 attackspam
20/6/6@23:49:03: FAIL: Alarm-Network address from=1.9.21.100
20/6/6@23:49:03: FAIL: Alarm-Network address from=1.9.21.100
...
2020-06-07 18:12:57
139.59.7.177 attackbots
Jun  7 07:37:39 vps687878 sshd\[588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.177  user=root
Jun  7 07:37:41 vps687878 sshd\[588\]: Failed password for root from 139.59.7.177 port 42106 ssh2
Jun  7 07:41:35 vps687878 sshd\[1321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.177  user=root
Jun  7 07:41:38 vps687878 sshd\[1321\]: Failed password for root from 139.59.7.177 port 45810 ssh2
Jun  7 07:45:46 vps687878 sshd\[1884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.177  user=root
...
2020-06-07 17:38:09
38.102.172.47 attackspambots
2020-06-07T11:35:01.385021sd-86998 sshd[36395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.102.172.47  user=root
2020-06-07T11:35:03.079700sd-86998 sshd[36395]: Failed password for root from 38.102.172.47 port 25928 ssh2
2020-06-07T11:38:38.052739sd-86998 sshd[36889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.102.172.47  user=root
2020-06-07T11:38:40.541398sd-86998 sshd[36889]: Failed password for root from 38.102.172.47 port 21950 ssh2
2020-06-07T11:42:18.894178sd-86998 sshd[37393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.102.172.47  user=root
2020-06-07T11:42:20.584900sd-86998 sshd[37393]: Failed password for root from 38.102.172.47 port 17956 ssh2
...
2020-06-07 18:05:18
211.57.153.250 attackbotsspam
Jun  7 01:42:12 pixelmemory sshd[1241702]: Failed password for root from 211.57.153.250 port 42443 ssh2
Jun  7 01:45:51 pixelmemory sshd[1246262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.57.153.250  user=root
Jun  7 01:45:53 pixelmemory sshd[1246262]: Failed password for root from 211.57.153.250 port 42172 ssh2
Jun  7 01:49:26 pixelmemory sshd[1250656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.57.153.250  user=root
Jun  7 01:49:28 pixelmemory sshd[1250656]: Failed password for root from 211.57.153.250 port 41900 ssh2
...
2020-06-07 18:06:25
106.12.112.49 attackspambots
 TCP (SYN) 106.12.112.49:48405 -> port 32198, len 44
2020-06-07 17:34:39
47.204.232.28 attackbotsspam
Scanning an empty webserver with deny all robots.txt
2020-06-07 17:49:44
87.246.7.66 attackbotsspam
2020-06-07T10:59:24.386264beta postfix/smtpd[25812]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: authentication failure
2020-06-07T11:00:11.740038beta postfix/smtpd[25810]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: authentication failure
2020-06-07T11:00:58.612809beta postfix/smtpd[25810]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: authentication failure
...
2020-06-07 18:01:44
106.12.144.249 attack
2020-06-07T05:44:47.972447amanda2.illicoweb.com sshd\[47624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.144.249  user=root
2020-06-07T05:44:50.147405amanda2.illicoweb.com sshd\[47624\]: Failed password for root from 106.12.144.249 port 36136 ssh2
2020-06-07T05:47:07.836171amanda2.illicoweb.com sshd\[47970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.144.249  user=root
2020-06-07T05:47:09.564438amanda2.illicoweb.com sshd\[47970\]: Failed password for root from 106.12.144.249 port 38030 ssh2
2020-06-07T05:49:09.685554amanda2.illicoweb.com sshd\[48064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.144.249  user=root
...
2020-06-07 18:08:22
103.44.248.87 attackbotsspam
Wordpress malicious attack:[sshd]
2020-06-07 18:01:15
114.103.136.69 attack
Jun  7 06:31:59 lnxmysql61 sshd[14530]: Failed password for root from 114.103.136.69 port 60881 ssh2
Jun  7 06:31:59 lnxmysql61 sshd[14530]: Failed password for root from 114.103.136.69 port 60881 ssh2
2020-06-07 17:44:27
134.209.104.117 attackspambots
Jun  6 20:42:05 pixelmemory sshd[504843]: Failed password for root from 134.209.104.117 port 45038 ssh2
Jun  6 20:45:48 pixelmemory sshd[515145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.104.117  user=root
Jun  6 20:45:51 pixelmemory sshd[515145]: Failed password for root from 134.209.104.117 port 47526 ssh2
Jun  6 20:49:29 pixelmemory sshd[528153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.104.117  user=root
Jun  6 20:49:31 pixelmemory sshd[528153]: Failed password for root from 134.209.104.117 port 50402 ssh2
...
2020-06-07 17:55:53

Recently Reported IPs

115.74.72.178 62.197.103.12 103.202.76.158 114.84.62.189
113.210.121.150 113.190.159.185 200.194.20.4 113.190.124.49
113.181.213.17 113.181.78.67 9.170.20.78 113.181.5.51
113.172.48.150 103.119.66.247 209.132.224.239 1.197.131.86
201.54.236.121 60.89.38.224 1.0.154.4 57.249.106.82