139.210.101.45 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Possibly Malicious Host 🟢 10/100

Host and Network Information

  • View other sources: Spamhaus VirusTotal

  • Country:
  • Network:
  • Noticed: times
  • Protcols Attacked: mssql

Malware Detected on Host

Count:

Open Ports Detected

10001 10443 1723 443 500 8888

CVEs Detected

CVE-2001-1556 CVE-2003-0020 CVE-2003-0542 CVE-2003-0987 CVE-2003-0993 CVE-2004-0174 CVE-2004-0263 CVE-2004-0492 CVE-2004-0940 CVE-2004-0942 CVE-2004-1082 CVE-2004-2343 CVE-2005-3352 CVE-2006-20001 CVE-2006-3747 CVE-2006-3918 CVE-2006-5752 CVE-2006-7250 CVE-2007-3108 CVE-2007-3304 CVE-2007-4995 CVE-2007-5000 CVE-2007-5135 CVE-2007-6388 CVE-2007-6750 CVE-2008-0166 CVE-2008-2939 CVE-2008-5077 CVE-2008-7270 CVE-2009-0590 CVE-2009-0789 CVE-2009-1195 CVE-2009-1377 CVE-2009-1378 CVE-2009-1386 CVE-2009-1387 CVE-2009-2409 CVE-2009-3245 CVE-2009-3555 CVE-2009-4355 CVE-2010-0010 CVE-2010-0433 CVE-2010-0742 CVE-2010-4180 CVE-2010-4252 CVE-2010-5298 CVE-2011-1473 CVE-2011-1945 CVE-2011-3210 CVE-2011-3368 CVE-2011-4108 CVE-2011-4109 CVE-2011-4317 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2012-0027 CVE-2012-0884 CVE-2012-1165 CVE-2012-2110 CVE-2012-2333 CVE-2013-0166 CVE-2013-0169 CVE-2013-5697 CVE-2013-6449 CVE-2014-0076 CVE-2014-0195 CVE-2014-0221 CVE-2014-0224 CVE-2014-0231 CVE-2014-3470 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3510 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-8176 CVE-2014-8275 CVE-2015-0204 CVE-2015-0209 CVE-2015-0228 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293 CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3183 CVE-2015-3195 CVE-2015-4000 CVE-2016-0703 CVE-2016-0704 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 CVE-2016-2176 CVE-2016-7056 CVE-2016-8612 CVE-2017-3735 CVE-2017-9788 CVE-2017-9798 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2021-34798 CVE-2021-39275 CVE-2021-40438 CVE-2021-4044 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31813 CVE-2022-37436

Map

Whois Information

  • NetRange: 139.210.0.0 - 139.210.255.255
  • CIDR: 139.210.0.0/16
  • NetName: APNIC-ERX-139-210-0-0
  • NetHandle: NET-139-210-0-0-1
  • Parent: NET139 (NET-139-0-0-0-0)
  • NetType: Early Registrations, Transferred to APNIC
  • OriginAS:
  • Organization: Asia Pacific Network Information Centre (APNIC)
  • RegDate: 2010-11-03
  • Updated: 2010-11-17
  • Comment: This IP address range is not registered in the ARIN database.
  • Comment: This range was transferred to the APNIC Whois Database as
  • Comment: part of the ERX (Early Registration Transfer) project.
  • Comment: For details, refer to the APNIC Whois Database via
  • Comment:
  • Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
  • Comment: for the Asia Pacific region. APNIC does not operate networks
  • Comment: using this IP address range and is not able to investigate
  • Comment: spam or abuse reports relating to these addresses. For more
  • Ref: https://rdap.arin.net/registry/ip/139.210.0.0
  • OrgName: Asia Pacific Network Information Centre
  • OrgId: APNIC
  • Address: PO Box 3646
  • City: South Brisbane
  • StateProv: QLD
  • PostalCode: 4101
  • Country: AU
  • RegDate:
  • Updated: 2012-01-24
  • Ref: https://rdap.arin.net/registry/entity/APNIC
  • OrgTechHandle: AWC12-ARIN
  • OrgTechName: APNIC Whois Contact
  • OrgTechPhone: +61 7 3858 3188
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • OrgAbuseHandle: AWC12-ARIN
  • OrgAbuseName: APNIC Whois Contact
  • OrgAbusePhone: +61 7 3858 3188
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • inetnum: 139.208.0.0 - 139.215.255.255
  • netname: UNICOM-JL
  • descr: China Unicom Jilin province network
  • descr: China Unicom
  • descr: No.21,Jin-Rong Street,
  • descr: Beijing 100033
  • country: CN
  • admin-c: CH1302-AP
  • tech-c: WT92-AP
  • mnt-by: APNIC-HM
  • mnt-lower: MAINT-CNCGROUP
  • mnt-lower: MAINT-CNCGROUP-JL
  • mnt-routes: MAINT-CNCGROUP-RR
  • status: ALLOCATED PORTABLE
  • mnt-irt: IRT-CU-CN
  • last-modified: 2016-05-04T00:29:24Z
  • irt: IRT-CU-CN
  • address: No.21,Financial Street
  • address: Beijing,100033
  • address: P.R.China
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: CH1302-AP
  • tech-c: CH1302-AP
  • mnt-by: MAINT-CNCGROUP
  • last-modified: 2017-10-23T05:59:13Z
  • person: ChinaUnicom Hostmaster
  • nic-hdl: CH1302-AP
  • e-mail: [email protected]
  • address: No.21,Jin-Rong Street
  • address: Beijing,100033
  • address: P.R.China
  • phone: +86-10-66259764
  • fax-no: +86-10-66259764
  • country: CN
  • mnt-by: MAINT-CNCGROUP
  • last-modified: 2017-08-17T06:13:16Z
  • person: Wang Tiegang
  • nic-hdl: WT92-AP
  • e-mail: [email protected]
  • address: NO.3535,Renmin Street, ChangChun ,
  • address: Jilin province , 130021 , P.R. China
  • phone: +86-0431-87022560
  • fax-no: +86-0431-87022420
  • country: CN
  • mnt-by: MAINT-CNCGROUP-JL
  • last-modified: 2020-07-03T00:43:16Z
  • route: 139.208.0.0/13
  • descr: China Unicom Jilin Province Network
  • country: CN
  • origin: AS4837
  • mnt-by: MAINT-CNCGROUP-RR
  • last-modified: 2011-03-23T06:06:01Z

Links to attack logs

dosing-mssql-bruteforce-ip-list-2021-03-20