Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.99.131.140 attackbotsspam
(sshd) Failed SSH login from 139.99.131.140 (AU/Australia/ns539894.ip-139-99-131.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 26 02:45:39 host sshd[74987]: Invalid user auto from 139.99.131.140 port 58678
2020-04-26 14:56:42
139.99.131.6 attackbots
Trolling for resource vulnerabilities
2020-04-09 05:36:43
139.99.131.57 attackspam
9200/tcp 8088/tcp 6380/tcp...
[2020-04-08]8pkt,8pt.(tcp)
2020-04-09 05:30:36
139.99.131.57 attackbotsspam
Detected by ModSecurity. Request URI: /index.php?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1
2020-04-04 09:33:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.131.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.131.110.			IN	A

;; AUTHORITY SECTION:
.			440	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:06:55 CST 2022
;; MSG SIZE  rcvd: 107
Host info
110.131.99.139.in-addr.arpa domain name pointer host1.swiftdesigns.com.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
110.131.99.139.in-addr.arpa	name = host1.swiftdesigns.com.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.247.74.77 attack
23/tcp
[2019-08-06]1pkt
2019-08-07 11:43:52
191.53.248.145 attackspam
failed_logins
2019-08-07 11:20:40
80.80.173.58 attackspam
8080/tcp
[2019-08-06]1pkt
2019-08-07 11:25:13
191.23.124.139 attack
23/tcp
[2019-08-06]1pkt
2019-08-07 11:48:56
221.201.212.136 attackbots
23/tcp
[2019-08-06]1pkt
2019-08-07 11:38:55
47.254.200.17 attack
37215/tcp
[2019-08-06]1pkt
2019-08-07 11:19:14
189.171.15.135 attackbots
23/tcp
[2019-08-06]1pkt
2019-08-07 11:20:58
43.226.124.10 attackbotsspam
445/tcp
[2019-08-06]1pkt
2019-08-07 11:25:51
51.235.143.10 attackbots
firewall-block, port(s): 23/tcp
2019-08-07 10:58:40
2.237.249.70 attackspambots
firewall-block, port(s): 23/tcp
2019-08-07 11:02:57
163.172.13.168 attackbots
$f2bV_matches
2019-08-07 11:11:03
118.136.227.224 attackbotsspam
60001/tcp
[2019-08-06]1pkt
2019-08-07 11:36:36
222.122.94.10 attackbotsspam
Aug  7 00:23:09 pornomens sshd\[29869\]: Invalid user jesus from 222.122.94.10 port 33894
Aug  7 00:23:09 pornomens sshd\[29869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.122.94.10
Aug  7 00:23:11 pornomens sshd\[29869\]: Failed password for invalid user jesus from 222.122.94.10 port 33894 ssh2
...
2019-08-07 11:26:27
188.254.75.94 attackbotsspam
[portscan] Port scan
2019-08-07 11:18:05
154.211.99.195 attackspam
06.08.2019 23:37:00 Recursive DNS scan
2019-08-07 11:04:47

Recently Reported IPs

139.99.122.37 139.99.130.155 139.99.148.153 139.99.149.160
139.99.155.142 139.99.130.164 139.99.163.43 139.99.18.233
139.99.156.192 139.99.16.120 139.99.190.176 139.99.170.206
139.99.180.95 139.99.2.55 139.99.203.35 139.99.20.44
139.99.20.31 139.99.196.209 55.115.71.239 139.99.208.143