Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: Private Customer

Hostname: unknown

Organization: OVH SAS

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Nov  1 13:56:51 legacy sshd[22562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Nov  1 13:56:53 legacy sshd[22562]: Failed password for invalid user shoo from 139.99.67.111 port 56456 ssh2
Nov  1 14:01:26 legacy sshd[22684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
...
2019-11-01 21:06:54
attack
Oct 31 21:10:54 auw2 sshd\[11316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip111.ip-139-99-67.net  user=root
Oct 31 21:10:56 auw2 sshd\[11316\]: Failed password for root from 139.99.67.111 port 58790 ssh2
Oct 31 21:15:35 auw2 sshd\[11696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip111.ip-139-99-67.net  user=root
Oct 31 21:15:37 auw2 sshd\[11696\]: Failed password for root from 139.99.67.111 port 41570 ssh2
Oct 31 21:20:16 auw2 sshd\[12061\]: Invalid user alex from 139.99.67.111
2019-11-01 18:28:19
attackbots
Oct 30 13:36:29 SilenceServices sshd[9087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Oct 30 13:36:31 SilenceServices sshd[9087]: Failed password for invalid user P)o9I*u7 from 139.99.67.111 port 49350 ssh2
Oct 30 13:41:13 SilenceServices sshd[10431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
2019-10-30 20:44:04
attackbots
Oct 29 21:31:35 vps647732 sshd[27393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Oct 29 21:31:36 vps647732 sshd[27393]: Failed password for invalid user alana from 139.99.67.111 port 53922 ssh2
...
2019-10-30 04:42:22
attackspam
Oct 29 07:57:39 icinga sshd[13191]: Failed password for root from 139.99.67.111 port 41550 ssh2
...
2019-10-29 17:15:21
attack
Oct 27 00:15:43 localhost sshd\[11844\]: Invalid user gpadmin from 139.99.67.111 port 47936
Oct 27 00:15:43 localhost sshd\[11844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Oct 27 00:15:45 localhost sshd\[11844\]: Failed password for invalid user gpadmin from 139.99.67.111 port 47936 ssh2
2019-10-27 06:27:50
attackspambots
Oct 22 16:33:49 SilenceServices sshd[20367]: Failed password for root from 139.99.67.111 port 59958 ssh2
Oct 22 16:38:36 SilenceServices sshd[21603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Oct 22 16:38:37 SilenceServices sshd[21603]: Failed password for invalid user cock from 139.99.67.111 port 42716 ssh2
2019-10-23 00:19:25
attackbotsspam
Oct 20 06:28:49 MK-Soft-VM5 sshd[14377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111 
Oct 20 06:28:51 MK-Soft-VM5 sshd[14377]: Failed password for invalid user sai from 139.99.67.111 port 36186 ssh2
...
2019-10-20 17:22:36
attack
Oct 14 13:37:22 SilenceServices sshd[28898]: Failed password for root from 139.99.67.111 port 56540 ssh2
Oct 14 13:42:16 SilenceServices sshd[30260]: Failed password for root from 139.99.67.111 port 40232 ssh2
2019-10-15 00:54:06
attackbots
Oct 11 15:43:54 ip-172-31-1-72 sshd\[8066\]: Invalid user 123Blog from 139.99.67.111
Oct 11 15:43:54 ip-172-31-1-72 sshd\[8066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Oct 11 15:43:56 ip-172-31-1-72 sshd\[8066\]: Failed password for invalid user 123Blog from 139.99.67.111 port 60722 ssh2
Oct 11 15:48:23 ip-172-31-1-72 sshd\[8129\]: Invalid user P4sswort123!@\# from 139.99.67.111
Oct 11 15:48:23 ip-172-31-1-72 sshd\[8129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
2019-10-12 12:28:15
attackspambots
$f2bV_matches
2019-10-06 16:37:02
attack
Oct  5 14:42:00 vmanager6029 sshd\[21873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Oct  5 14:42:02 vmanager6029 sshd\[21873\]: Failed password for root from 139.99.67.111 port 59808 ssh2
Oct  5 14:46:32 vmanager6029 sshd\[21956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
2019-10-05 21:50:36
attack
2019-08-18 18:20:02,135 fail2ban.actions        [878]: NOTICE  [sshd] Ban 139.99.67.111
2019-08-18 21:24:45,956 fail2ban.actions        [878]: NOTICE  [sshd] Ban 139.99.67.111
2019-08-19 00:30:52,200 fail2ban.actions        [878]: NOTICE  [sshd] Ban 139.99.67.111
...
2019-10-03 15:04:37
attackbotsspam
Sep 28 01:12:08 lcdev sshd\[19548\]: Invalid user support from 139.99.67.111
Sep 28 01:12:08 lcdev sshd\[19548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip111.ip-139-99-67.net
Sep 28 01:12:10 lcdev sshd\[19548\]: Failed password for invalid user support from 139.99.67.111 port 53326 ssh2
Sep 28 01:17:27 lcdev sshd\[20003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip111.ip-139-99-67.net  user=root
Sep 28 01:17:30 lcdev sshd\[20003\]: Failed password for root from 139.99.67.111 port 37784 ssh2
2019-09-28 19:28:33
attackspam
2019-09-24 19:27:50,978 fail2ban.actions: WARNING [ssh] Ban 139.99.67.111
2019-09-25 03:53:08
attackspambots
Jul 31 20:44:55 vtv3 sshd\[10454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Jul 31 20:44:57 vtv3 sshd\[10454\]: Failed password for root from 139.99.67.111 port 36912 ssh2
Jul 31 20:50:04 vtv3 sshd\[12871\]: Invalid user sophie from 139.99.67.111 port 33554
Jul 31 20:50:04 vtv3 sshd\[12871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Jul 31 20:50:06 vtv3 sshd\[12871\]: Failed password for invalid user sophie from 139.99.67.111 port 33554 ssh2
Jul 31 21:04:49 vtv3 sshd\[20055\]: Invalid user student from 139.99.67.111 port 50804
Jul 31 21:04:49 vtv3 sshd\[20055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Jul 31 21:04:51 vtv3 sshd\[20055\]: Failed password for invalid user student from 139.99.67.111 port 50804 ssh2
Jul 31 21:09:46 vtv3 sshd\[22473\]: Invalid user guest1 from 139.99.67.111 port 47374
Jul 31 21:09
2019-09-21 20:10:48
attackspam
Jul 31 20:44:55 vtv3 sshd\[10454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Jul 31 20:44:57 vtv3 sshd\[10454\]: Failed password for root from 139.99.67.111 port 36912 ssh2
Jul 31 20:50:04 vtv3 sshd\[12871\]: Invalid user sophie from 139.99.67.111 port 33554
Jul 31 20:50:04 vtv3 sshd\[12871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Jul 31 20:50:06 vtv3 sshd\[12871\]: Failed password for invalid user sophie from 139.99.67.111 port 33554 ssh2
Jul 31 21:04:49 vtv3 sshd\[20055\]: Invalid user student from 139.99.67.111 port 50804
Jul 31 21:04:49 vtv3 sshd\[20055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Jul 31 21:04:51 vtv3 sshd\[20055\]: Failed password for invalid user student from 139.99.67.111 port 50804 ssh2
Jul 31 21:09:46 vtv3 sshd\[22473\]: Invalid user guest1 from 139.99.67.111 port 47374
Jul 31 21:09
2019-09-21 04:15:18
attack
ssh failed login
2019-09-15 05:00:03
attackspambots
Sep 13 02:08:44 ny01 sshd[18707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Sep 13 02:08:46 ny01 sshd[18707]: Failed password for invalid user mcserver from 139.99.67.111 port 42102 ssh2
Sep 13 02:13:42 ny01 sshd[19504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
2019-09-13 14:31:57
attack
Aug 25 16:24:42 MK-Soft-VM3 sshd\[13993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Aug 25 16:24:45 MK-Soft-VM3 sshd\[13993\]: Failed password for root from 139.99.67.111 port 34746 ssh2
Aug 25 16:29:25 MK-Soft-VM3 sshd\[14185\]: Invalid user awt from 139.99.67.111 port 52914
Aug 25 16:29:25 MK-Soft-VM3 sshd\[14185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
...
2019-08-26 01:19:43
attackbotsspam
Aug 23 17:13:44 eddieflores sshd\[10844\]: Invalid user arma3server from 139.99.67.111
Aug 23 17:13:44 eddieflores sshd\[10844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip111.ip-139-99-67.net
Aug 23 17:13:46 eddieflores sshd\[10844\]: Failed password for invalid user arma3server from 139.99.67.111 port 40736 ssh2
Aug 23 17:18:22 eddieflores sshd\[11306\]: Invalid user ninja from 139.99.67.111
Aug 23 17:18:22 eddieflores sshd\[11306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip111.ip-139-99-67.net
2019-08-24 11:18:36
attack
Aug 23 21:35:10 SilenceServices sshd[24134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Aug 23 21:35:11 SilenceServices sshd[24134]: Failed password for invalid user ubuntu from 139.99.67.111 port 34188 ssh2
Aug 23 21:39:42 SilenceServices sshd[28032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
2019-08-24 03:42:53
attack
*Port Scan* detected from 139.99.67.111 (SG/Singapore/ip111.ip-139-99-67.net). 4 hits in the last 200 seconds
2019-08-22 11:04:02
attackbots
Aug 12 05:45:29 h2177944 sshd\[2317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Aug 12 05:45:31 h2177944 sshd\[2317\]: Failed password for root from 139.99.67.111 port 47830 ssh2
Aug 12 05:50:10 h2177944 sshd\[2455\]: Invalid user postgres from 139.99.67.111 port 40176
Aug 12 05:50:10 h2177944 sshd\[2455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
...
2019-08-12 12:37:08
attackspambots
Aug 11 23:10:57 SilenceServices sshd[17909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Aug 11 23:10:59 SilenceServices sshd[17909]: Failed password for invalid user ubuntu from 139.99.67.111 port 48236 ssh2
Aug 11 23:15:38 SilenceServices sshd[20471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
2019-08-12 05:24:41
attackspambots
SSH-BruteForce
2019-08-11 08:59:18
attackbots
2019-08-06T23:18:19.844672abusebot-2.cloudsearch.cf sshd\[10420\]: Invalid user mateo from 139.99.67.111 port 57760
2019-08-07 14:03:03
attack
Jul 31 21:55:59 localhost sshd\[22055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Jul 31 21:56:01 localhost sshd\[22055\]: Failed password for root from 139.99.67.111 port 49598 ssh2
Jul 31 22:00:57 localhost sshd\[22717\]: Invalid user hhchen from 139.99.67.111 port 46014
Jul 31 22:00:57 localhost sshd\[22717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
2019-08-01 04:05:34
attackspam
Jul 30 00:37:17 vibhu-HP-Z238-Microtower-Workstation sshd\[25988\]: Invalid user cuc from 139.99.67.111
Jul 30 00:37:17 vibhu-HP-Z238-Microtower-Workstation sshd\[25988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Jul 30 00:37:19 vibhu-HP-Z238-Microtower-Workstation sshd\[25988\]: Failed password for invalid user cuc from 139.99.67.111 port 46158 ssh2
Jul 30 00:42:13 vibhu-HP-Z238-Microtower-Workstation sshd\[26176\]: Invalid user dbus from 139.99.67.111
Jul 30 00:42:13 vibhu-HP-Z238-Microtower-Workstation sshd\[26176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
...
2019-07-30 03:26:12
attackbots
Jul 28 16:21:52 SilenceServices sshd[24923]: Failed password for root from 139.99.67.111 port 60804 ssh2
Jul 28 16:26:51 SilenceServices sshd[28606]: Failed password for root from 139.99.67.111 port 54604 ssh2
2019-07-29 02:18:20
Comments on same subnet:
IP Type Details Datetime
139.99.67.109 attackspam
Feb 25 17:19:20 motanud sshd\[2292\]: Invalid user teamspeak from 139.99.67.109 port 50082
Feb 25 17:19:20 motanud sshd\[2292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.109
Feb 25 17:19:23 motanud sshd\[2292\]: Failed password for invalid user teamspeak from 139.99.67.109 port 50082 ssh2
2019-08-10 22:37:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.67.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8867
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.67.111.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 29 02:18:15 CST 2019
;; MSG SIZE  rcvd: 117
Host info
111.67.99.139.in-addr.arpa domain name pointer ip111.ip-139-99-67.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
111.67.99.139.in-addr.arpa	name = ip111.ip-139-99-67.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.228.91.123 attackspam
2020-08-09T19:07:45.019394v22018076590370373 sshd[22415]: Failed password for root from 193.228.91.123 port 58074 ssh2
2020-08-09T19:08:04.884388v22018076590370373 sshd[29440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.228.91.123  user=root
2020-08-09T19:08:07.225449v22018076590370373 sshd[29440]: Failed password for root from 193.228.91.123 port 47520 ssh2
2020-08-09T19:08:27.033851v22018076590370373 sshd[4514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.228.91.123  user=root
2020-08-09T19:08:29.199516v22018076590370373 sshd[4514]: Failed password for root from 193.228.91.123 port 36972 ssh2
...
2020-08-10 01:13:18
114.67.88.76 attackbotsspam
SSH Brute Force
2020-08-10 00:52:19
114.231.110.35 attackspam
CN CN/China/- Failures: 5 smtpauth
2020-08-10 00:48:57
149.56.107.216 attackspambots
Aug  9 18:43:52 ip106 sshd[19342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.107.216 
Aug  9 18:43:54 ip106 sshd[19342]: Failed password for invalid user saqib from 149.56.107.216 port 45192 ssh2
...
2020-08-10 01:08:24
218.92.0.246 attackspambots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-10 00:46:07
193.112.42.13 attack
" "
2020-08-10 01:12:42
123.212.117.129 attack
firewall-block, port(s): 23/tcp
2020-08-10 00:36:47
59.42.91.176 attackspambots
firewall-block, port(s): 1433/tcp
2020-08-10 00:45:08
46.21.249.141 attackbotsspam
ET COMPROMISED Known Compromised or Hostile Host Traffic group 26 - port: 22 proto: tcp cat: Misc Attackbytes: 60
2020-08-10 01:10:14
198.27.79.180 attackbotsspam
SSH Brute Force
2020-08-10 01:06:12
82.65.23.62 attackspam
SSH brutforce
2020-08-10 00:38:55
83.97.20.196 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-10 00:32:18
94.125.122.90 attack
Bruteforce detected by fail2ban
2020-08-10 00:44:01
91.191.209.132 attack
Aug  9 16:22:31 blackbee postfix/smtpd[12052]: warning: unknown[91.191.209.132]: SASL LOGIN authentication failed: authentication failure
Aug  9 16:23:05 blackbee postfix/smtpd[12045]: warning: unknown[91.191.209.132]: SASL LOGIN authentication failed: authentication failure
Aug  9 16:23:41 blackbee postfix/smtpd[12053]: warning: unknown[91.191.209.132]: SASL LOGIN authentication failed: authentication failure
Aug  9 16:24:17 blackbee postfix/smtpd[12052]: warning: unknown[91.191.209.132]: SASL LOGIN authentication failed: authentication failure
Aug  9 16:24:51 blackbee postfix/smtpd[12052]: warning: unknown[91.191.209.132]: SASL LOGIN authentication failed: authentication failure
...
2020-08-10 00:55:25
222.186.180.142 attackspam
Aug  9 18:46:32 amit sshd\[28385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Aug  9 18:46:35 amit sshd\[28385\]: Failed password for root from 222.186.180.142 port 56869 ssh2
Aug  9 18:46:38 amit sshd\[28385\]: Failed password for root from 222.186.180.142 port 56869 ssh2
...
2020-08-10 00:51:09

Recently Reported IPs

198.20.244.98 32.32.85.222 208.28.45.42 42.193.84.255
152.136.206.28 119.108.46.7 71.104.185.30 165.117.88.164
148.165.19.8 204.156.68.81 106.32.210.169 107.62.34.66
149.11.196.134 169.179.208.1 142.93.183.133 87.179.154.106
207.113.195.100 117.93.63.142 127.126.127.3 149.44.50.29