139.59.20.166 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 139.59.20.166 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 20/100

Host and Network Information

  • View other sources: Spamhaus VirusTotal

  • Country: India
  • Network:
  • Noticed: times
  • Protocols Attacked: telnet
  • Passive DNS Results: automate.vighneshsk.in e2e-dbaas-mongodb-rhkj7-r-2cfdc00e.mongo.ondigitalocean.com www.hostingworth.com hostingworth.com sweet-ardinghelli.139-59-20-166.plesk.page e2e-dbaas-mongodb-k7bvp-d8004ea8.mongo.ondigitalocean.com e2e-dbaas-mongodb-nllnz-r-ce0db5bd.mongo.ondigitalocean.com vcf5qsvx944.c.updraftclone.com e2e-dbaas-mongodb-9hbs2-r-ba6da2ca.mongo.ondigitalocean.com wazippy.com server.wazippy.com easyengineeringhindi.in

Malware Detected on Host

Count: 477 a743fa898008077b9c7331547520cce94ec1cd8f95323c2bf3c91c4e7a66875d 95276f51959260cb55e9f476eb5b334301b789ed91dab04bf8572e5a8bcaf1b8 ad618b5ab55b3985df1e64321f8c047715e38c3765b2bc7a3de529dcc807c8f4 aa2176abbf136c823c40ab43bedb92f461498175330d8c914db7fdf109675fed 6e640edf63c9d81ace85db31ab7d10902546a43260c92985c55c461c55a77cd7 32601430fcb11a90dde7c7870a6c974d21c1cc8267cca9e857b43813c73d43b8 76132565140d4d521775dd362cb87dfb7a67433006c2af366cf8396323f4f8b2 2175828fa33a1dc3b51735dc656a2284ae96b2a799c52b1fa8fec8a3be87325a 680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b 1d5bc8bf67829f1b9dcec87eea7e0c236a1054fc75a76163450279d7c70a7380

Open Ports Detected

111 80

CVEs Detected

CVE-2006-20001 CVE-2007-3205 CVE-2007-4723 CVE-2009-0796 CVE-2009-2299 CVE-2011-1176 CVE-2011-2688 CVE-2011-4718 CVE-2012-1171 CVE-2012-3526 CVE-2012-4001 CVE-2012-4360 CVE-2013-0941 CVE-2013-0942 CVE-2013-2220 CVE-2013-2765 CVE-2013-3735 CVE-2013-4113 CVE-2013-4248 CVE-2013-4352 CVE-2013-4365 CVE-2013-5704 CVE-2013-6420 CVE-2013-6438 CVE-2013-6501 CVE-2013-6712 CVE-2013-7327 CVE-2013-7345 CVE-2013-7456 CVE-2014-0098 CVE-2014-0117 CVE-2014-0118 CVE-2014-0185 CVE-2014-0207 CVE-2014-0226 CVE-2014-0231 CVE-2014-0236 CVE-2014-0237 CVE-2014-0238 CVE-2014-1943 CVE-2014-2020 CVE-2014-2270 CVE-2014-2497 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-3523 CVE-2014-3538 CVE-2014-3581 CVE-2014-3587 CVE-2014-3597 CVE-2014-3668 CVE-2014-3669 CVE-2014-3670 CVE-2014-3710 CVE-2014-3981 CVE-2014-4049 CVE-2014-4670 CVE-2014-4698 CVE-2014-4721 CVE-2014-5120 CVE-2014-5459 CVE-2014-8109 CVE-2014-8142 CVE-2014-9425 CVE-2014-9426 CVE-2014-9427 CVE-2014-9652 CVE-2014-9653 CVE-2014-9705 CVE-2014-9709 CVE-2014-9767 CVE-2014-9912 CVE-2015-0228 CVE-2015-0231 CVE-2015-0232 CVE-2015-0235 CVE-2015-0273 CVE-2015-1351 CVE-2015-1352 CVE-2015-2301 CVE-2015-2305 CVE-2015-2325 CVE-2015-2326 CVE-2015-2331 CVE-2015-2348 CVE-2015-2783 CVE-2015-2787 CVE-2015-3152 CVE-2015-3183 CVE-2015-3184 CVE-2015-3185 CVE-2015-3307 CVE-2015-3329 CVE-2015-3330 CVE-2015-3411 CVE-2015-3412 CVE-2015-3414 CVE-2015-3415 CVE-2015-3416 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4025 CVE-2015-4026 CVE-2015-4116 CVE-2015-4147 CVE-2015-4148 CVE-2015-4598 CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 CVE-2015-4602 CVE-2015-4603 CVE-2015-4604 CVE-2015-4605 CVE-2015-4642 CVE-2015-4643 CVE-2015-4644 CVE-2015-5589 CVE-2015-5590 CVE-2015-6497 CVE-2015-6831 CVE-2015-6832 CVE-2015-6833 CVE-2015-6834 CVE-2015-6835 CVE-2015-6836 CVE-2015-6837 CVE-2015-6838 CVE-2015-7803 CVE-2015-7804 CVE-2015-8835 CVE-2015-8838 CVE-2015-8865 CVE-2015-8867 CVE-2015-8873 CVE-2015-8874 CVE-2015-8876 CVE-2015-8877 CVE-2015-8879 CVE-2015-8935 CVE-2015-8994 CVE-2015-9253 CVE-2016-0736 CVE-2016-10158 CVE-2016-10159 CVE-2016-10161 CVE-2016-10397 CVE-2016-10712 CVE-2016-1903 CVE-2016-2161 CVE-2016-2554 CVE-2016-3141 CVE-2016-3142 CVE-2016-3171 CVE-2016-3185 CVE-2016-4070 CVE-2016-4342 CVE-2016-4343 CVE-2016-4537 CVE-2016-4538 CVE-2016-4539 CVE-2016-4540 CVE-2016-4541 CVE-2016-4542 CVE-2016-4543 CVE-2016-4975 CVE-2016-5093 CVE-2016-5094 CVE-2016-5095 CVE-2016-5096 CVE-2016-5114 CVE-2016-5387 CVE-2016-5399 CVE-2016-5766 CVE-2016-5767 CVE-2016-5768 CVE-2016-5769 CVE-2016-5770 CVE-2016-5771 CVE-2016-5772 CVE-2016-5773 CVE-2016-6174 CVE-2016-6288 CVE-2016-6289 CVE-2016-6290 CVE-2016-6291 CVE-2016-6292 CVE-2016-6294 CVE-2016-6295 CVE-2016-6296 CVE-2016-6297 CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418 CVE-2016-7478 CVE-2016-8612 CVE-2016-8670 CVE-2016-8743 CVE-2016-9137 CVE-2016-9138 CVE-2016-9933 CVE-2016-9934 CVE-2016-9935 CVE-2017-11142 CVE-2017-11143 CVE-2017-11144 CVE-2017-11145 CVE-2017-11147 CVE-2017-11628 CVE-2017-12868 CVE-2017-12933 CVE-2017-15710 CVE-2017-15715 CVE-2017-16642 CVE-2017-3167 CVE-2017-7272 CVE-2017-7679 CVE-2017-7890 CVE-2017-7963 CVE-2017-8923 CVE-2017-9224 CVE-2017-9226 CVE-2017-9788 CVE-2017-9798 CVE-2018-10545 CVE-2018-10546 CVE-2018-10547 CVE-2018-10548 CVE-2018-10549 CVE-2018-1283 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-1312 CVE-2018-14851 CVE-2018-14883 CVE-2018-15132 CVE-2018-17082 CVE-2018-17199 CVE-2018-19395 CVE-2018-19396 CVE-2018-19520 CVE-2018-20783 CVE-2018-5711 CVE-2018-5712 CVE-2018-7584 CVE-2019-0217 CVE-2019-0220 CVE-2019-10092 CVE-2019-10098 CVE-2019-17567 CVE-2019-6977 CVE-2019-9020 CVE-2019-9021 CVE-2019-9023 CVE-2019-9024 CVE-2019-9637 CVE-2019-9638 CVE-2019-9639 CVE-2019-9641 CVE-2020-11579 CVE-2020-11985 CVE-2020-13938 CVE-2020-1927 CVE-2020-1934 CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-32785 CVE-2021-32786 CVE-2021-32791 CVE-2021-32792 CVE-2021-34798 CVE-2021-39275 CVE-2021-40438 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 CVE-2022-26377 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31628 CVE-2022-31629 CVE-2022-31813 CVE-2022-36760 CVE-2022-37436 CVE-2023-25690 CVE-2023-31122 CVE-2023-45802

Map

Whois Information

  • NetRange: 139.59.0.0 - 139.59.255.255
  • CIDR: 139.59.0.0/16
  • NetName: APNIC-ERX-139-59-0-0
  • NetHandle: NET-139-59-0-0-1
  • Parent: NET139 (NET-139-0-0-0-0)
  • NetType: Early Registrations, Transferred to APNIC
  • OriginAS:
  • Organization: Asia Pacific Network Information Centre (APNIC)
  • RegDate: 2004-03-03
  • Updated: 2009-10-08
  • Comment: This IP address range is not registered in the ARIN database.
  • Comment: This range was transferred to the APNIC Whois Database as
  • Comment: part of the ERX (Early Registration Transfer) project.
  • Comment: For details, refer to the APNIC Whois Database via
  • Comment:
  • Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
  • Comment: for the Asia Pacific region. APNIC does not operate networks
  • Comment: using this IP address range and is not able to investigate
  • Comment: spam or abuse reports relating to these addresses. For more
  • Ref: https://rdap.arin.net/registry/ip/139.59.0.0
  • OrgName: Asia Pacific Network Information Centre
  • OrgId: APNIC
  • Address: PO Box 3646
  • City: South Brisbane
  • StateProv: QLD
  • PostalCode: 4101
  • Country: AU
  • RegDate:
  • Updated: 2012-01-24
  • Ref: https://rdap.arin.net/registry/entity/APNIC
  • OrgAbuseHandle: AWC12-ARIN
  • OrgAbuseName: APNIC Whois Contact
  • OrgAbusePhone: +61 7 3858 3188
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • OrgTechHandle: AWC12-ARIN
  • OrgTechName: APNIC Whois Contact
  • OrgTechPhone: +61 7 3858 3188
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • inetnum: 139.59.16.0 - 139.59.31.255
  • netname: DIGITALOCEAN-AP
  • descr: DigitalOcean, LLC
  • country: IN
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • abuse-c: AD699-AP
  • status: ASSIGNED NON-PORTABLE
  • mnt-by: MAINT-DIGITALOCEAN-AP
  • mnt-irt: IRT-DIGITALOCEAN-AP
  • last-modified: 2020-05-31T21:34:24Z
  • irt: IRT-DIGITALOCEAN-AP
  • address: 101 Avenue of the Americas, 10th Floor, New York NY 10013
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • mnt-by: MAINT-DIGITALOCEAN-AP
  • last-modified: 2023-03-15T13:08:34Z
  • role: ABUSE DIGITALOCEANAP
  • address: 101 Avenue of the Americas, 10th Floor, New York NY 10013
  • country: ZZ
  • phone: +000000000
  • e-mail: [email protected]
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • nic-hdl: AD699-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2023-03-15T13:10:39Z
  • role: Digital Ocean Inc administrator
  • address: 101 Avenue of th Americas, 10th Floor, New York NY 10013
  • country: US
  • phone: +1 646 397 8051
  • fax-no: +1 646 397 8051
  • e-mail: [email protected]
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • nic-hdl: DOIA2-AP
  • mnt-by: MAINT-DIGITALOCEAN-AP
  • last-modified: 2015-04-02T20:27:52Z

Links to attack logs

** ** vultrparis-telnet-bruteforce-ip-list-2022-07-09 **