Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.26.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30380
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.26.117.			IN	A

;; AUTHORITY SECTION:
.			417	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:07:04 CST 2022
;; MSG SIZE  rcvd: 106
Host info
117.26.99.139.in-addr.arpa domain name pointer ip117.ip-139-99-26.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.26.99.139.in-addr.arpa	name = ip117.ip-139-99-26.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.193.185.231 attackspam
$f2bV_matches
2019-10-01 19:40:00
101.108.149.102 attackbotsspam
2019-10-01T03:46:35.758850abusebot-5.cloudsearch.cf sshd\[8992\]: Invalid user admin from 101.108.149.102 port 59837
2019-10-01 19:14:49
177.220.135.10 attackbots
Oct  1 11:29:53 marvibiene sshd[22279]: Invalid user admin from 177.220.135.10 port 18721
Oct  1 11:29:53 marvibiene sshd[22279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.135.10
Oct  1 11:29:53 marvibiene sshd[22279]: Invalid user admin from 177.220.135.10 port 18721
Oct  1 11:29:55 marvibiene sshd[22279]: Failed password for invalid user admin from 177.220.135.10 port 18721 ssh2
...
2019-10-01 19:31:06
37.59.38.216 attack
2019-10-01T10:57:26.656269abusebot-7.cloudsearch.cf sshd\[28619\]: Invalid user sales from 37.59.38.216 port 60916
2019-10-01 19:11:38
113.204.228.66 attackspam
Invalid user smtp from 113.204.228.66 port 48786
2019-10-01 19:10:02
142.93.114.123 attack
Sep 30 17:42:02 tdfoods sshd\[27089\]: Invalid user abdel from 142.93.114.123
Sep 30 17:42:02 tdfoods sshd\[27089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123
Sep 30 17:42:04 tdfoods sshd\[27089\]: Failed password for invalid user abdel from 142.93.114.123 port 43848 ssh2
Sep 30 17:45:56 tdfoods sshd\[27396\]: Invalid user admin from 142.93.114.123
Sep 30 17:45:56 tdfoods sshd\[27396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123
2019-10-01 19:47:32
47.74.137.101 attackspambots
xmlrpc attack
2019-10-01 19:39:31
121.190.197.205 attackspambots
Oct  1 12:12:59 MK-Soft-Root1 sshd[12062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.190.197.205 
Oct  1 12:13:01 MK-Soft-Root1 sshd[12062]: Failed password for invalid user user from 121.190.197.205 port 50302 ssh2
...
2019-10-01 19:11:08
118.97.188.105 attack
Oct  1 04:44:50 Tower sshd[15191]: Connection from 118.97.188.105 port 47630 on 192.168.10.220 port 22
Oct  1 04:44:51 Tower sshd[15191]: Invalid user fatimac from 118.97.188.105 port 47630
Oct  1 04:44:51 Tower sshd[15191]: error: Could not get shadow information for NOUSER
Oct  1 04:44:51 Tower sshd[15191]: Failed password for invalid user fatimac from 118.97.188.105 port 47630 ssh2
Oct  1 04:44:52 Tower sshd[15191]: Received disconnect from 118.97.188.105 port 47630:11: Bye Bye [preauth]
Oct  1 04:44:52 Tower sshd[15191]: Disconnected from invalid user fatimac 118.97.188.105 port 47630 [preauth]
2019-10-01 19:25:45
144.217.166.59 attackbotsspam
Oct  1 10:56:42 rotator sshd\[11821\]: Failed password for root from 144.217.166.59 port 60868 ssh2Oct  1 10:56:45 rotator sshd\[11821\]: Failed password for root from 144.217.166.59 port 60868 ssh2Oct  1 10:56:48 rotator sshd\[11821\]: Failed password for root from 144.217.166.59 port 60868 ssh2Oct  1 10:56:51 rotator sshd\[11821\]: Failed password for root from 144.217.166.59 port 60868 ssh2Oct  1 10:56:54 rotator sshd\[11821\]: Failed password for root from 144.217.166.59 port 60868 ssh2Oct  1 10:56:56 rotator sshd\[11821\]: Failed password for root from 144.217.166.59 port 60868 ssh2
...
2019-10-01 19:09:06
167.99.125.22 attack
22/tcp
[2019-10-01]1pkt
2019-10-01 19:14:29
80.211.113.144 attack
Oct  1 10:58:47 lnxded64 sshd[14445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Oct  1 10:58:47 lnxded64 sshd[14445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
2019-10-01 19:36:20
45.248.146.22 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.248.146.22/ 
 BD - 1H : (45)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BD 
 NAME ASN : ASN134813 
 
 IP : 45.248.146.22 
 
 CIDR : 45.248.146.0/24 
 
 PREFIX COUNT : 4 
 
 UNIQUE IP COUNT : 1024 
 
 
 WYKRYTE ATAKI Z ASN134813 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-01 05:46:34 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 19:17:30
49.88.112.113 attackbots
Oct  1 01:22:08 friendsofhawaii sshd\[10075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Oct  1 01:22:09 friendsofhawaii sshd\[10075\]: Failed password for root from 49.88.112.113 port 22985 ssh2
Oct  1 01:22:11 friendsofhawaii sshd\[10075\]: Failed password for root from 49.88.112.113 port 22985 ssh2
Oct  1 01:22:13 friendsofhawaii sshd\[10075\]: Failed password for root from 49.88.112.113 port 22985 ssh2
Oct  1 01:22:36 friendsofhawaii sshd\[10122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2019-10-01 19:27:30
177.106.179.19 attack
Automatic report - Port Scan Attack
2019-10-01 19:22:18

Recently Reported IPs

139.99.38.148 139.99.42.194 139.99.253.173 139.99.37.170
139.99.60.128 139.99.46.91 139.99.60.30 139.99.61.164
139.99.61.206 139.99.62.131 139.99.62.22 139.99.65.117
139.99.64.133 139.99.63.148 139.99.65.119 139.99.65.118
139.99.68.101 139.99.67.104 139.99.68.134 139.99.68.124