Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: OVH Singapore Pte. Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
5x Failed Password
2020-09-05 04:15:07
attackspam
5x Failed Password
2020-09-04 19:49:59
attackspambots
'Fail2Ban'
2020-08-20 01:20:19
attack
Jul  9 11:55:52 nas sshd[1870]: Failed password for root from 139.99.120.130 port 36984 ssh2
Jul  9 11:55:55 nas sshd[1870]: Failed password for root from 139.99.120.130 port 36984 ssh2
Jul  9 11:55:57 nas sshd[1870]: Failed password for root from 139.99.120.130 port 36984 ssh2
Jul  9 11:56:00 nas sshd[1870]: Failed password for root from 139.99.120.130 port 36984 ssh2
...
2020-07-09 18:08:46
Comments on same subnet:
IP Type Details Datetime
139.99.120.194 attack
firewall-block, port(s): 8001/tcp
2020-10-14 08:54:02
139.99.120.194 attackbots
 TCP (SYN) 139.99.120.194:15898 -> port 39222, len 48
2020-09-27 03:10:29
139.99.120.194 attackbotsspam
" "
2020-09-26 19:08:07
139.99.120.194 attack
*Port Scan* detected from 139.99.120.194 (SG/Singapore/-/Singapore (Downtown Core)/ns558209.ip-139-99-120.net). 4 hits in the last 75 seconds
2020-09-01 08:16:19
139.99.120.194 attackspam
scans 35 times in preceeding hours on the ports (in chronological order) 2006 2007 2008 2009 2010 2010 2012 2013 2014 2015 2016 2017 2018 2021 2026 2027 2028 2029 2030 2031 2032 2010 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046
2020-08-26 23:59:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.120.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.120.130.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070900 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 09 18:08:40 CST 2020
;; MSG SIZE  rcvd: 118
Host info
130.120.99.139.in-addr.arpa domain name pointer ns548123.ip-139-99-120.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.120.99.139.in-addr.arpa	name = ns548123.ip-139-99-120.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.222.72.234 attackspam
Sep  3 10:26:28 SilenceServices sshd[16862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
Sep  3 10:26:30 SilenceServices sshd[16862]: Failed password for invalid user test2 from 92.222.72.234 port 47752 ssh2
Sep  3 10:31:40 SilenceServices sshd[18904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
2019-09-03 16:48:58
191.53.59.55 attackbotsspam
Excessive failed login attempts on port 25
2019-09-03 16:41:40
141.98.81.111 attack
19/9/3@04:11:21: FAIL: IoT-SSH address from=141.98.81.111
...
2019-09-03 16:21:27
185.216.140.27 attackspam
09/03/2019-04:31:52.421420 185.216.140.27 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-03 16:52:16
118.68.246.43 attackspam
445/tcp 445/tcp
[2019-09-03]2pkt
2019-09-03 16:56:37
181.112.184.114 attackspam
firewall-block, port(s): 23/tcp
2019-09-03 17:08:59
167.71.202.131 attackbotsspam
Sep  3 10:11:06 ArkNodeAT sshd\[7524\]: Invalid user roscoe from 167.71.202.131
Sep  3 10:11:06 ArkNodeAT sshd\[7524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.202.131
Sep  3 10:11:09 ArkNodeAT sshd\[7524\]: Failed password for invalid user roscoe from 167.71.202.131 port 19766 ssh2
2019-09-03 16:29:29
219.143.144.130 attack
219.143.144.130 has been banned from MailServer for Abuse
...
2019-09-03 16:38:39
49.88.112.114 attack
Sep  3 10:14:27 bouncer sshd\[19731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep  3 10:14:29 bouncer sshd\[19731\]: Failed password for root from 49.88.112.114 port 38439 ssh2
Sep  3 10:14:31 bouncer sshd\[19731\]: Failed password for root from 49.88.112.114 port 38439 ssh2
...
2019-09-03 16:21:08
167.71.106.66 attack
09/03/2019-04:11:15.266995 167.71.106.66 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 8
2019-09-03 16:27:56
201.209.244.28 attackspam
445/tcp
[2019-09-03]1pkt
2019-09-03 16:50:01
222.186.30.165 attack
$f2bV_matches
2019-09-03 16:31:48
36.62.243.130 attackbotsspam

...
2019-09-03 16:18:59
106.38.133.45 attack
[portscan] Port scan
2019-09-03 16:29:09
106.13.39.233 attackbotsspam
$f2bV_matches_ltvn
2019-09-03 16:55:29

Recently Reported IPs

182.61.132.245 192.241.226.183 81.214.142.254 42.118.51.61
83.130.10.72 117.254.112.140 114.43.170.146 52.163.81.12
13.84.208.13 5.232.102.153 203.185.133.180 188.146.226.168
129.204.238.250 201.71.32.87 200.115.117.37 186.94.220.71
203.85.72.177 177.46.83.129 125.27.126.200 117.5.236.182