Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: OVH Singapore Pte. Ltd

Hostname: unknown

Organization: OVH SAS

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Jun 17 20:51:26 server sshd\[115824\]: Invalid user info from 139.99.41.193
Jun 17 20:51:26 server sshd\[115824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.41.193
Jun 17 20:51:28 server sshd\[115824\]: Failed password for invalid user info from 139.99.41.193 port 34868 ssh2
...
2019-07-12 06:26:21
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.41.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36936
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.41.193.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 24 00:09:21 +08 2019
;; MSG SIZE  rcvd: 117

Host info
193.41.99.139.in-addr.arpa domain name pointer 193.ip-139-99-41.eu.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
193.41.99.139.in-addr.arpa	name = 193.ip-139-99-41.eu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.98.63.6 attack
namecheap spam
2020-03-03 05:52:42
139.199.29.155 attack
$f2bV_matches
2020-03-03 05:24:58
181.49.150.45 attackspambots
Mar  2 22:31:37 localhost sshd\[11086\]: Invalid user upload from 181.49.150.45 port 44636
Mar  2 22:31:37 localhost sshd\[11086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.150.45
Mar  2 22:31:39 localhost sshd\[11086\]: Failed password for invalid user upload from 181.49.150.45 port 44636 ssh2
2020-03-03 05:33:16
190.145.233.82 attack
Blocked by UFW
2020-03-03 05:44:18
86.62.81.50 attack
Mar  2 21:03:24 mout sshd[12894]: Invalid user odoo from 86.62.81.50 port 58908
2020-03-03 05:45:49
49.151.33.123 attackbots
Unauthorized connection attempt from IP address 49.151.33.123 on Port 445(SMB)
2020-03-03 05:36:09
148.70.187.205 attackbotsspam
Mar  2 19:07:37 MK-Soft-VM5 sshd[19910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.187.205 
Mar  2 19:07:39 MK-Soft-VM5 sshd[19910]: Failed password for invalid user musicbot from 148.70.187.205 port 41495 ssh2
...
2020-03-03 05:26:50
126.132.115.46 attackspambots
Unauthorized connection attempt from IP address 126.132.115.46 on Port 445(SMB)
2020-03-03 05:18:23
218.2.43.27 attack
Mar  2 14:32:22 localhost kernel: [2939894.423195] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=218.2.43.27 DST=91.205.173.180 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=19110 DF PROTO=TCP SPT=4929 DPT=3389 WINDOW=65535 RES=0x00 SYN URGP=0 
Mar  2 14:32:25 localhost kernel: [2939897.241224] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=218.2.43.27 DST=91.205.173.180 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=19304 DF PROTO=TCP SPT=4929 DPT=3389 WINDOW=65535 RES=0x00 SYN URGP=0 
Mar  2 14:32:31 localhost kernel: [2939903.276459] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=218.2.43.27 DST=91.205.173.180 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=19644 DF PROTO=TCP SPT=4929 DPT=3389 WINDOW=65535 RES=0x00 SYN URGP=0
2020-03-03 05:32:55
220.173.201.6 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-03 05:53:00
202.144.128.7 attackbotsspam
$f2bV_matches
2020-03-03 05:36:50
118.25.26.200 attackspambots
Mar  2 13:37:25 XXX sshd[63503]: Invalid user HTTP from 118.25.26.200 port 33240
2020-03-03 05:50:47
92.63.196.3 attack
Mar  2 22:16:33 debian-2gb-nbg1-2 kernel: \[5442974.849703\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.63.196.3 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=12626 PROTO=TCP SPT=52646 DPT=3348 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-03 05:31:00
200.148.90.225 attackspambots
1583155942 - 03/02/2020 14:32:22 Host: 200.148.90.225/200.148.90.225 Port: 445 TCP Blocked
2020-03-03 05:39:52
91.205.131.147 attackbots
Unauthorized connection attempt from IP address 91.205.131.147 on Port 445(SMB)
2020-03-03 05:48:03

Recently Reported IPs

180.36.176.199 37.49.230.132 188.254.0.112 46.33.175.245
79.239.201.196 78.23.218.164 18.136.44.154 122.243.209.8
131.161.207.22 163.42.201.105 158.196.134.33 235.40.191.161
197.25.27.57 71.237.98.97 83.186.182.217 78.105.165.201
208.19.52.170 98.114.3.159 220.247.238.199 76.79.32.94