Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: OVH SAS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.202.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65338
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.202.72.			IN	A

;; AUTHORITY SECTION:
.			985	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041801 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 19 05:32:40 +08 2019
;; MSG SIZE  rcvd: 117

Host info
72.202.99.139.in-addr.arpa domain name pointer 72.ip-139-99-202.eu.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
72.202.99.139.in-addr.arpa	name = 72.ip-139-99-202.eu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.39.213.211 attackspambots
Dec 19 15:06:31 tux-35-217 sshd\[15958\]: Invalid user otsu from 103.39.213.211 port 33936
Dec 19 15:06:31 tux-35-217 sshd\[15958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.213.211
Dec 19 15:06:33 tux-35-217 sshd\[15958\]: Failed password for invalid user otsu from 103.39.213.211 port 33936 ssh2
Dec 19 15:13:06 tux-35-217 sshd\[16042\]: Invalid user admin from 103.39.213.211 port 51422
Dec 19 15:13:06 tux-35-217 sshd\[16042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.213.211
...
2019-12-19 22:19:30
50.247.207.5 attack
Sending SPAM email
2019-12-19 22:06:00
175.149.75.60 attack
Dec 19 07:27:48 debian-2gb-nbg1-2 kernel: \[389637.638235\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=175.149.75.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=42 ID=7096 PROTO=TCP SPT=23011 DPT=23 WINDOW=46371 RES=0x00 SYN URGP=0
2019-12-19 22:34:41
138.201.254.88 spambotsattackproxynormal
Log
2019-12-19 22:29:42
185.208.211.86 attackspam
2019-12-17 18:27:27 no host name found for IP address 185.208.211.86
2019-12-17 18:27:28 no host name found for IP address 185.208.211.86
2019-12-17 18:27:43 no host name found for IP address 185.208.211.86
2019-12-17 18:27:58 no host name found for IP address 185.208.211.86
2019-12-17 18:28:13 no host name found for IP address 185.208.211.86
2019-12-17 18:28:28 no host name found for IP address 185.208.211.86
2019-12-17 18:28:43 no host name found for IP address 185.208.211.86
2019-12-17 18:28:58 no host name found for IP address 185.208.211.86
2019-12-17 18:29:13 no host name found for IP address 185.208.211.86
2019-12-17 18:29:28 no host name found for IP address 185.208.211.86
2019-12-17 18:29:43 no host name found for IP address 185.208.211.86
2019-12-17 18:29:58 no host name found for IP address 185.208.211.86
2019-12-17 18:30:13 no host name found for IP address 185.208.211.86
2019-12-17 18:30:28 no host name found for IP address 185.208.211.86
2019-12-17 18:30:43........
------------------------------
2019-12-19 22:24:24
221.125.165.59 attackbotsspam
Dec 19 08:52:01 TORMINT sshd\[30373\]: Invalid user gt05 from 221.125.165.59
Dec 19 08:52:01 TORMINT sshd\[30373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
Dec 19 08:52:03 TORMINT sshd\[30373\]: Failed password for invalid user gt05 from 221.125.165.59 port 50176 ssh2
...
2019-12-19 22:20:43
81.93.78.144 attack
Brute force SMTP login attempts.
2019-12-19 22:47:08
103.5.112.133 attackspambots
Dec 19 04:08:30 php1 sshd\[24063\]: Invalid user nfs from 103.5.112.133
Dec 19 04:08:30 php1 sshd\[24063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.5.112.133
Dec 19 04:08:32 php1 sshd\[24063\]: Failed password for invalid user nfs from 103.5.112.133 port 32855 ssh2
Dec 19 04:14:52 php1 sshd\[24926\]: Invalid user chcho from 103.5.112.133
Dec 19 04:14:52 php1 sshd\[24926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.5.112.133
2019-12-19 22:28:16
159.89.165.36 attackbots
Dec 19 09:46:59 ws12vmsma01 sshd[10102]: Invalid user packet from 159.89.165.36
Dec 19 09:47:01 ws12vmsma01 sshd[10102]: Failed password for invalid user packet from 159.89.165.36 port 39140 ssh2
Dec 19 09:55:26 ws12vmsma01 sshd[11223]: Invalid user 888888 from 159.89.165.36
...
2019-12-19 22:16:51
138.197.89.212 attackspam
Dec 19 04:17:18 web9 sshd\[4240\]: Invalid user meygan from 138.197.89.212
Dec 19 04:17:18 web9 sshd\[4240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
Dec 19 04:17:20 web9 sshd\[4240\]: Failed password for invalid user meygan from 138.197.89.212 port 52640 ssh2
Dec 19 04:22:47 web9 sshd\[5003\]: Invalid user bostyn from 138.197.89.212
Dec 19 04:22:47 web9 sshd\[5003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
2019-12-19 22:25:44
51.75.160.215 attack
k+ssh-bruteforce
2019-12-19 22:14:35
203.114.102.69 attackspam
Dec 19 14:57:05 server sshd\[25055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69  user=root
Dec 19 14:57:08 server sshd\[25055\]: Failed password for root from 203.114.102.69 port 34632 ssh2
Dec 19 15:07:05 server sshd\[27806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69  user=mysql
Dec 19 15:07:07 server sshd\[27806\]: Failed password for mysql from 203.114.102.69 port 55938 ssh2
Dec 19 15:13:09 server sshd\[29279\]: Invalid user cradduck from 203.114.102.69
Dec 19 15:13:09 server sshd\[29279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69 
...
2019-12-19 22:28:34
41.76.102.85 attack
email spam
2019-12-19 22:22:11
120.133.1.16 attack
Dec 19 15:39:40 lnxded64 sshd[9129]: Failed password for root from 120.133.1.16 port 46764 ssh2
Dec 19 15:39:40 lnxded64 sshd[9129]: Failed password for root from 120.133.1.16 port 46764 ssh2
2019-12-19 22:49:15
210.18.176.60 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-19 22:39:10

Recently Reported IPs

78.133.37.8 73.12.65.212 138.68.254.27 94.23.70.229
177.44.18.114 192.64.27.100 185.222.211.106 125.26.143.205
78.130.148.98 114.106.151.224 113.123.0.59 81.182.246.50
198.16.43.29 150.109.70.99 104.203.96.123 180.168.107.50
203.109.13.46 216.245.200.118 42.236.10.103 119.47.11.185