Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: OVH Singapore Pte. Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Nov 11 08:21:49 MK-Soft-VM6 sshd[11586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.83.198 
Nov 11 08:21:50 MK-Soft-VM6 sshd[11586]: Failed password for invalid user tamai from 139.99.83.198 port 59616 ssh2
...
2019-11-11 22:11:27
attackspam
Nov  1 13:24:27 srv01 sshd[32117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip198.ip-139-99-83.net  user=root
Nov  1 13:24:30 srv01 sshd[32117]: Failed password for root from 139.99.83.198 port 52615 ssh2
Nov  1 13:29:20 srv01 sshd[32373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip198.ip-139-99-83.net  user=root
Nov  1 13:29:22 srv01 sshd[32373]: Failed password for root from 139.99.83.198 port 44659 ssh2
Nov  1 13:34:21 srv01 sshd[32606]: Invalid user qn from 139.99.83.198
...
2019-11-01 22:12:49
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.83.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.83.198.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 443 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 22:12:39 CST 2019
;; MSG SIZE  rcvd: 117
Host info
198.83.99.139.in-addr.arpa domain name pointer ip198.ip-139-99-83.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
198.83.99.139.in-addr.arpa	name = ip198.ip-139-99-83.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.212.117.161 attackbotsspam
Automatic report - Port Scan Attack
2020-09-17 12:07:12
182.253.245.42 attack
Unauthorized connection attempt from IP address 182.253.245.42 on Port 445(SMB)
2020-09-17 12:31:57
189.212.90.217 attackbots
Found on   CINS badguys     / proto=6  .  srcport=19341  .  dstport=1433  .     (1136)
2020-09-17 12:16:55
118.89.48.148 attack
20 attempts against mh-ssh on pcx
2020-09-17 12:27:29
67.205.141.165 attackspambots
2020-09-17T00:46:58+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-17 12:08:28
123.194.79.187 attackspam
Sep 16 18:05:07 ssh2 sshd[64979]: User root from 123-194-79-187.dynamic.kbronet.com.tw not allowed because not listed in AllowUsers
Sep 16 18:05:08 ssh2 sshd[64979]: Failed password for invalid user root from 123.194.79.187 port 34486 ssh2
Sep 16 18:05:08 ssh2 sshd[64979]: Connection closed by invalid user root 123.194.79.187 port 34486 [preauth]
...
2020-09-17 12:14:18
68.183.233.228 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-17 12:05:53
61.93.240.65 attackspambots
2020-09-17T04:26:24.653735vps1033 sshd[19884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240065.static.ctinets.com
2020-09-17T04:26:24.642232vps1033 sshd[19884]: Invalid user sys from 61.93.240.65 port 58833
2020-09-17T04:26:26.916885vps1033 sshd[19884]: Failed password for invalid user sys from 61.93.240.65 port 58833 ssh2
2020-09-17T04:31:11.845644vps1033 sshd[29785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240065.static.ctinets.com  user=root
2020-09-17T04:31:19.273163vps1033 sshd[29785]: Failed password for root from 61.93.240.65 port 36555 ssh2
...
2020-09-17 12:36:18
185.201.89.202 attackspambots
Honeypot attack, port: 445, PTR: 185x201x89x202.nat.perm.1enter.net.
2020-09-17 12:37:43
92.63.197.95 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 40181 proto: tcp cat: Misc Attackbytes: 60
2020-09-17 12:40:37
190.205.117.18 attack
Unauthorized connection attempt from IP address 190.205.117.18 on Port 445(SMB)
2020-09-17 12:13:34
197.49.109.98 attackspambots
DATE:2020-09-16 19:00:22, IP:197.49.109.98, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-17 12:39:06
171.96.239.116 attackspam
Sep 16 13:02:11 aragorn sshd[15643]: Invalid user user1 from 171.96.239.116
Sep 16 13:02:11 aragorn sshd[15648]: Invalid user user1 from 171.96.239.116
Sep 16 13:02:12 aragorn sshd[15644]: Invalid user user1 from 171.96.239.116
Sep 16 13:02:12 aragorn sshd[15645]: Invalid user user1 from 171.96.239.116
...
2020-09-17 12:27:09
106.13.126.15 attack
Sep 17 03:45:37 vps647732 sshd[16333]: Failed password for root from 106.13.126.15 port 60510 ssh2
...
2020-09-17 12:25:54
91.126.44.204 attackbots
Sep 16 18:05:07 ssh2 sshd[64975]: User root from 91.126.44.204 not allowed because not listed in AllowUsers
Sep 16 18:05:07 ssh2 sshd[64975]: Failed password for invalid user root from 91.126.44.204 port 52356 ssh2
Sep 16 18:05:07 ssh2 sshd[64975]: Connection closed by invalid user root 91.126.44.204 port 52356 [preauth]
...
2020-09-17 12:08:04

Recently Reported IPs

235.15.38.173 63.248.35.234 83.153.22.37 51.179.224.176
142.160.248.165 36.67.249.177 117.11.41.134 175.27.144.39
40.215.29.240 225.99.38.172 69.223.112.167 230.145.61.88
187.94.118.168 36.227.83.75 24.49.87.195 4.5.123.32
40.5.141.39 92.48.167.218 60.61.204.194 49.154.106.253