Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: Martijn Kools

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Port probing on unauthorized port 7134
2020-03-10 08:02:13
Comments on same subnet:
IP Type Details Datetime
139.99.222.79 spambotsattackproxynormal
Super win
2022-06-06 06:47:34
139.99.221.61 attack
$f2bV_matches
2020-02-12 00:54:56
139.99.221.61 attack
Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J]
2020-02-06 16:49:17
139.99.221.61 attackbots
Feb  2 05:58:33 haigwepa sshd[21028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 
Feb  2 05:58:36 haigwepa sshd[21028]: Failed password for invalid user upload from 139.99.221.61 port 37437 ssh2
...
2020-02-02 13:10:17
139.99.22.94 attack
2020-02-01T15:01:24.862381hz01.yumiweb.com sshd\[6650\]: Invalid user admin from 139.99.22.94 port 57969
2020-02-01T15:01:26.470579hz01.yumiweb.com sshd\[6652\]: Invalid user admin from 139.99.22.94 port 58734
2020-02-01T15:01:28.071920hz01.yumiweb.com sshd\[6654\]: Invalid user user from 139.99.22.94 port 59286
...
2020-02-02 02:36:38
139.99.221.61 attack
Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J]
2020-01-26 15:13:09
139.99.221.61 attackspambots
Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J]
2020-01-17 21:10:34
139.99.221.61 attack
$f2bV_matches
2020-01-11 23:46:20
139.99.221.61 attackbotsspam
Invalid user tomek from 139.99.221.61 port 57996
2020-01-10 22:30:27
139.99.221.61 attack
Dec 31 03:27:37 ws19vmsma01 sshd[147604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
Dec 31 03:27:39 ws19vmsma01 sshd[147604]: Failed password for invalid user liaan from 139.99.221.61 port 35512 ssh2
...
2019-12-31 16:00:05
139.99.221.61 attack
Dec  4 15:46:10 Ubuntu-1404-trusty-64-minimal sshd\[22367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61  user=root
Dec  4 15:46:12 Ubuntu-1404-trusty-64-minimal sshd\[22367\]: Failed password for root from 139.99.221.61 port 37864 ssh2
Dec  4 15:57:05 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: Invalid user admin from 139.99.221.61
Dec  4 15:57:05 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
Dec  4 15:57:07 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: Failed password for invalid user admin from 139.99.221.61 port 51553 ssh2
2019-12-04 23:20:56
139.99.221.61 attackbots
Nov 29 09:12:50 OPSO sshd\[6006\]: Invalid user dwlee200 from 139.99.221.61 port 52802
Nov 29 09:12:50 OPSO sshd\[6006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
Nov 29 09:12:52 OPSO sshd\[6006\]: Failed password for invalid user dwlee200 from 139.99.221.61 port 52802 ssh2
Nov 29 09:16:52 OPSO sshd\[6662\]: Invalid user minella from 139.99.221.61 port 43209
Nov 29 09:16:52 OPSO sshd\[6662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
2019-11-29 16:58:50
139.99.221.61 attack
2019-11-26T22:57:20.361407abusebot-7.cloudsearch.cf sshd\[24597\]: Invalid user creation from 139.99.221.61 port 44649
2019-11-27 07:05:52
139.99.221.61 attack
Nov 23 16:46:03 server sshd\[23466\]: User root from 139.99.221.61 not allowed because listed in DenyUsers
Nov 23 16:46:03 server sshd\[23466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61  user=root
Nov 23 16:46:04 server sshd\[23466\]: Failed password for invalid user root from 139.99.221.61 port 52611 ssh2
Nov 23 16:50:24 server sshd\[2950\]: User root from 139.99.221.61 not allowed because listed in DenyUsers
Nov 23 16:50:24 server sshd\[2950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61  user=root
2019-11-23 23:01:16
139.99.221.61 attackbots
$f2bV_matches
2019-11-16 17:03:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.22.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.22.196.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030902 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 08:02:09 CST 2020
;; MSG SIZE  rcvd: 117
Host info
196.22.99.139.in-addr.arpa domain name pointer ip196.ip-139-99-22.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.22.99.139.in-addr.arpa	name = ip196.ip-139-99-22.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
168.90.89.35 attackspam
Jul  3 04:17:26 sso sshd[14776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35
Jul  3 04:17:27 sso sshd[14776]: Failed password for invalid user comercial from 168.90.89.35 port 37146 ssh2
...
2020-07-03 20:45:50
135.241.236.64 attackbots
[SPAM] will we schedule an appointment for tomorrow?
2020-07-03 20:56:09
184.180.96.171 attackspambots
[SPAM] I look at you and I cannot resist!
2020-07-03 21:02:36
147.201.206.196 attackbots
[SPAM] can we schedule an appointment for today?
2020-07-03 21:24:37
37.9.134.133 attack
[SPAM] could you meet me at the weekend?
2020-07-03 20:57:43
86.47.252.137 attackspambots
[SPAM] let's do it tomorrow
2020-07-03 21:19:25
51.205.217.80 attackbotsspam
[SPAM] can you meet me tomorrow?
2020-07-03 21:27:54
69.245.223.224 attackbotsspam
[SPAM] This attracts me very much
2020-07-03 21:17:07
155.247.62.143 attack
[SPAM] Me and this bottle of red wine ;)
2020-07-03 20:51:47
51.205.86.113 attackspambots
[SPAM] let's do it today
2020-07-03 21:28:15
194.12.121.100 attackspam
[SPAM] I'm ready to tell you a couple of vulgar secrets ;)
2020-07-03 20:54:44
120.95.192.237 attackspambots
[SPAM] Me and this bottle of red wine ;)
2020-07-03 20:52:16
147.114.164.202 attack
[SPAM] at the weekend you can
2020-07-03 20:46:17
161.252.188.47 attack
[SPAM] I want to meet you
2020-07-03 21:21:01
89.16.103.241 attack
[SPAM] Me and this bottle of red wine ;)
2020-07-03 20:57:20

Recently Reported IPs

192.58.80.60 107.206.34.239 45.224.105.82 69.76.92.152
59.32.216.81 46.161.101.29 208.96.77.194 197.44.74.174
121.162.230.201 87.101.92.72 197.43.229.68 197.42.17.183
197.41.244.241 241.142.209.169 197.41.96.233 63.45.236.33
234.230.160.202 99.47.229.242 153.167.30.54 223.88.126.158