Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.99.144.22 botsattack
Agresive port scan
2025-02-20 13:41:12
139.99.170.175 attack
PHISHING ATTACK  "You can have your own Brand NEW Iphone 11 Pro this Christmas!"
2020-12-13 08:20:41
139.99.120.194 attack
firewall-block, port(s): 8001/tcp
2020-10-14 08:54:02
139.99.155.219 attackspam
2020-10-12T11:19:31.938205server.espacesoutien.com sshd[14388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.155.219  user=root
2020-10-12T11:19:34.060267server.espacesoutien.com sshd[14388]: Failed password for root from 139.99.155.219 port 34288 ssh2
2020-10-12T11:22:49.548458server.espacesoutien.com sshd[14916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.155.219  user=root
2020-10-12T11:22:51.519890server.espacesoutien.com sshd[14916]: Failed password for root from 139.99.155.219 port 48956 ssh2
...
2020-10-13 03:18:59
139.99.155.219 attackbotsspam
2020-10-12T10:02:31.899236abusebot.cloudsearch.cf sshd[9778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-63118ed8.vps.ovh.ca  user=root
2020-10-12T10:02:33.778229abusebot.cloudsearch.cf sshd[9778]: Failed password for root from 139.99.155.219 port 55466 ssh2
2020-10-12T10:06:15.032752abusebot.cloudsearch.cf sshd[9839]: Invalid user Csenge from 139.99.155.219 port 41906
2020-10-12T10:06:15.037980abusebot.cloudsearch.cf sshd[9839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-63118ed8.vps.ovh.ca
2020-10-12T10:06:15.032752abusebot.cloudsearch.cf sshd[9839]: Invalid user Csenge from 139.99.155.219 port 41906
2020-10-12T10:06:17.334683abusebot.cloudsearch.cf sshd[9839]: Failed password for invalid user Csenge from 139.99.155.219 port 41906 ssh2
2020-10-12T10:09:29.853578abusebot.cloudsearch.cf sshd[9888]: Invalid user yongmi from 139.99.155.219 port 56588
...
2020-10-12 18:47:41
139.99.134.195 attackbotsspam
GET /configuration.php-bak
GET /configuration.php_bak
GET /configuration.php.bak
GET /configuration.bak
GET /configuration.php_new
GET /configuration.php.old
GET /configuration.php.new
GET /configuration.php_Old
GET /configuration.php_old
2020-10-12 07:31:56
139.99.134.195 attackbotsspam
GET /configuration.php-bak
GET /configuration.php_bak
GET /configuration.php.bak
GET /configuration.bak
GET /configuration.php_new
GET /configuration.php.old
GET /configuration.php.new
GET /configuration.php_Old
GET /configuration.php_old
2020-10-11 23:47:20
139.99.134.195 attackbots
(mod_security) mod_security (id:210730) triggered by 139.99.134.195 (AU/Australia/vps-62ae2a86.vps.ovh.ca): 5 in the last 3600 secs
2020-10-11 15:46:23
139.99.134.195 attackbotsspam
(mod_security) mod_security (id:210730) triggered by 139.99.134.195 (AU/Australia/vps-62ae2a86.vps.ovh.ca): 5 in the last 3600 secs
2020-10-11 09:04:23
139.99.148.4 attackbots
139.99.148.4 - - [07/Oct/2020:15:35:38 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.148.4 - - [07/Oct/2020:16:01:07 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-08 04:29:11
139.99.148.4 attack
Attempted WordPress login: "GET /wp-login.php"
2020-10-07 20:48:50
139.99.148.4 attackspam
139.99.148.4 - - [07/Oct/2020:02:44:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2394 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.148.4 - - [07/Oct/2020:02:44:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2328 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.148.4 - - [07/Oct/2020:02:44:56 +0100] "POST /wp-login.php HTTP/1.1" 200 2376 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-07 12:33:19
139.99.121.6 attackspambots
139.99.121.6 - - [06/Oct/2020:00:21:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2254 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.121.6 - - [06/Oct/2020:00:21:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2257 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.121.6 - - [06/Oct/2020:00:21:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2253 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-06 07:56:46
139.99.121.6 attackspambots
REQUESTED PAGE: /wp-login.php
2020-10-06 00:18:16
139.99.121.6 attackspambots
139.99.121.6 - - [05/Oct/2020:05:08:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2254 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.121.6 - - [05/Oct/2020:05:08:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.121.6 - - [05/Oct/2020:05:08:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2282 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-05 16:17:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.1.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.1.148.			IN	A

;; AUTHORITY SECTION:
.			288	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021092600 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 26 23:09:49 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 148.1.99.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.1.99.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.115 attackbots
(sshd) Failed SSH login from 222.186.15.115 (-): 5 in the last 3600 secs
2020-05-02 06:32:48
165.227.66.224 attackbots
May  2 00:25:46 meumeu sshd[7440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224 
May  2 00:25:49 meumeu sshd[7440]: Failed password for invalid user pmc2 from 165.227.66.224 port 36816 ssh2
May  2 00:30:28 meumeu sshd[8145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224 
...
2020-05-02 07:02:27
45.163.144.2 attackbots
20 attempts against mh-ssh on cloud
2020-05-02 06:31:58
141.98.9.157 attackbots
Invalid user admin from 141.98.9.157 port 34577
2020-05-02 06:46:25
182.75.77.38 attack
Invalid user tomas from 182.75.77.38 port 50222
2020-05-02 06:42:08
179.39.130.111 attackspambots
1588363959 - 05/01/2020 22:12:39 Host: 179.39.130.111/179.39.130.111 Port: 445 TCP Blocked
2020-05-02 07:03:35
141.98.9.160 attack
Invalid user user from 141.98.9.160 port 34189
2020-05-02 06:38:33
114.237.109.8 attackbots
SpamScore above: 10.0
2020-05-02 06:46:47
222.186.175.167 attackbots
May  2 00:42:36 pve1 sshd[8465]: Failed password for root from 222.186.175.167 port 20694 ssh2
May  2 00:42:40 pve1 sshd[8465]: Failed password for root from 222.186.175.167 port 20694 ssh2
...
2020-05-02 06:51:22
164.52.24.169 attackbotsspam
SIP Server BruteForce Attack
2020-05-02 06:40:45
192.241.151.77 attack
192.241.151.77 - - [02/May/2020:00:32:39 +0200] "GET /wp-login.php HTTP/1.1" 200 6435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.241.151.77 - - [02/May/2020:00:32:40 +0200] "POST /wp-login.php HTTP/1.1" 200 6686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.241.151.77 - - [02/May/2020:00:32:41 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-02 07:01:55
182.254.145.29 attackbots
May  2 00:03:00 vpn01 sshd[14782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.145.29
May  2 00:03:01 vpn01 sshd[14782]: Failed password for invalid user mar from 182.254.145.29 port 52654 ssh2
...
2020-05-02 06:37:58
45.64.156.210 attackspambots
Automatic report - XMLRPC Attack
2020-05-02 06:47:27
35.193.6.171 attack
Automatic report - XMLRPC Attack
2020-05-02 06:57:21
125.22.9.186 attack
Invalid user upgrade from 125.22.9.186 port 51802
2020-05-02 06:45:47

Recently Reported IPs

27.3.32.103 167.172.37.14 185.60.253.251 76.120.192.212
105.205.212.8 178.30.204.249 188.155.88.210 115.242.146.250
177.103.178.252 60.90.241.253 213.219.232.130 152.93.57.202
233.209.1.54 89.99.113.209 89.99.113.210 89.99.113.204
89.99.113.220 89.99.113.110 185.152.182.9 36.81.52.178