139.59.90.31 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 139.59.90.31 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 45/100

Host and Network Information

  • Tags: cyber security, ioc, malicious, Nextray, phishing
  • JARM: 27d28d28d00028d00027d28d27d28dce49238b62fc566f8bdb579566d23d07

  • View other sources: Spamhaus VirusTotal

  • Country: India
  • Network: AS14061 digitalocean llc
  • Noticed: 30 times
  • Protocols Attacked: SSH
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: bugs.sastratechnologies.net anybank.co.in sastratechnologies.in

Open Ports Detected

3306 443 4949 80 8080 9999

CVEs Detected

CVE-2008-0462 CVE-2008-1731 CVE-2008-1792 CVE-2008-2629 CVE-2008-4633 CVE-2008-4710 CVE-2008-5996 CVE-2008-5998 CVE-2008-5999 CVE-2008-6020 CVE-2008-6134 CVE-2008-6135 CVE-2008-6137 CVE-2008-6383 CVE-2008-6413 CVE-2008-6835 CVE-2008-6836 CVE-2008-6908 CVE-2008-6909 CVE-2008-6910 CVE-2008-6972 CVE-2008-7150 CVE-2008-7151 CVE-2009-0382 CVE-2009-0817 CVE-2009-0818 CVE-2009-1035 CVE-2009-1036 CVE-2009-1037 CVE-2009-1047 CVE-2009-1069 CVE-2009-1249 CVE-2009-1342 CVE-2009-1343 CVE-2009-1344 CVE-2009-1501 CVE-2009-1505 CVE-2009-1507 CVE-2009-1823 CVE-2009-2074 CVE-2009-2075 CVE-2009-2076 CVE-2009-2077 CVE-2009-2078 CVE-2009-2079 CVE-2009-2083 CVE-2009-2237 CVE-2009-2291 CVE-2009-2370 CVE-2009-2371 CVE-2009-2572 CVE-2009-2610 CVE-2009-3121 CVE-2009-3122 CVE-2009-3156 CVE-2009-3157 CVE-2009-3206 CVE-2009-3207 CVE-2009-3210 CVE-2009-3350 CVE-2009-3351 CVE-2009-3353 CVE-2009-3354 CVE-2009-3363 CVE-2009-3435 CVE-2009-3437 CVE-2009-3442 CVE-2009-3479 CVE-2009-3488 CVE-2009-3568 CVE-2009-3648 CVE-2009-3650 CVE-2009-3651 CVE-2009-3652 CVE-2009-3653 CVE-2009-3654 CVE-2009-3656 CVE-2009-3657 CVE-2009-3778 CVE-2009-3779 CVE-2009-3780 CVE-2009-3782 CVE-2009-3783 CVE-2009-3784 CVE-2009-3785 CVE-2009-3786 CVE-2009-3914 CVE-2009-3915 CVE-2009-3916 CVE-2009-3917 CVE-2009-3918 CVE-2009-3919 CVE-2009-3920 CVE-2009-3921 CVE-2009-3922 CVE-2009-4042 CVE-2009-4043 CVE-2009-4044 CVE-2009-4061 CVE-2009-4062 CVE-2009-4063 CVE-2009-4064 CVE-2009-4065 CVE-2009-4066 CVE-2009-4119 CVE-2009-4207 CVE-2009-4296 CVE-2009-4429 CVE-2009-4513 CVE-2009-4514 CVE-2009-4515 CVE-2009-4516 CVE-2009-4517 CVE-2009-4518 CVE-2009-4520 CVE-2009-4524 CVE-2009-4525 CVE-2009-4526 CVE-2009-4527 CVE-2009-4528 CVE-2009-4532 CVE-2009-4533 CVE-2009-4534 CVE-2009-4557 CVE-2009-4558 CVE-2009-4559 CVE-2009-4602 CVE-2009-4771 CVE-2009-4772 CVE-2009-4773 CVE-2009-4829 CVE-2009-4990 CVE-2009-5096 CVE-2010-0370 CVE-2010-0697 CVE-2010-0752 CVE-2010-1074 CVE-2010-1107 CVE-2010-1108 CVE-2010-1303 CVE-2010-1358 CVE-2010-1362 CVE-2010-1530 CVE-2010-1536 CVE-2010-1539 CVE-2010-1543 CVE-2010-1584 CVE-2010-1958 CVE-2010-1976 CVE-2010-1984 CVE-2010-1998 CVE-2010-2000 CVE-2010-2001 CVE-2010-2002 CVE-2010-2030 CVE-2010-2048 CVE-2010-2123 CVE-2010-2125 CVE-2010-2158 CVE-2010-2352 CVE-2010-2353 CVE-2010-2724 CVE-2010-3423 CVE-2010-4519 CVE-2010-4520 CVE-2010-4521 CVE-2010-4775 CVE-2010-4813 CVE-2011-0899 CVE-2011-1066 CVE-2011-1661 CVE-2011-1662 CVE-2011-1663 CVE-2011-1664 CVE-2011-4113 CVE-2011-4560 CVE-2011-5030 CVE-2012-0914 CVE-2012-1056 CVE-2012-1057 CVE-2012-1060 CVE-2012-2056 CVE-2012-2339 CVE-2012-2340 CVE-2012-2341 CVE-2012-2907 CVE-2017-20005 CVE-2018-16843 CVE-2018-16844 CVE-2018-16845 CVE-2019-10909 CVE-2019-10910 CVE-2019-10911 CVE-2019-11358 CVE-2019-11831 CVE-2019-20372 CVE-2019-6338 CVE-2019-6339 CVE-2019-6340 CVE-2019-6341 CVE-2019-9511 CVE-2019-9513 CVE-2019-9516 CVE-2020-13675 CVE-2020-13677 CVE-2020-28948 CVE-2020-28949 CVE-2021-23017 CVE-2021-3618 CVE-2022-24728 CVE-2022-24729 CVE-2022-24775 CVE-2022-25273 CVE-2022-25275 CVE-2022-25277 CVE-2022-25278 CVE-2022-39261 CVE-2023-44487

Map

Whois Information

  • NetRange: 139.59.0.0 - 139.59.255.255
  • CIDR: 139.59.0.0/16
  • NetName: APNIC-ERX-139-59-0-0
  • NetHandle: NET-139-59-0-0-1
  • Parent: NET139 (NET-139-0-0-0-0)
  • NetType: Early Registrations, Transferred to APNIC
  • OriginAS:
  • Organization: Asia Pacific Network Information Centre (APNIC)
  • RegDate: 2004-03-03
  • Updated: 2009-10-08
  • Comment: This IP address range is not registered in the ARIN database.
  • Comment: This range was transferred to the APNIC Whois Database as
  • Comment: part of the ERX (Early Registration Transfer) project.
  • Comment: For details, refer to the APNIC Whois Database via
  • Comment:
  • Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
  • Comment: for the Asia Pacific region. APNIC does not operate networks
  • Comment: using this IP address range and is not able to investigate
  • Comment: spam or abuse reports relating to these addresses. For more
  • Ref: https://rdap.arin.net/registry/ip/139.59.0.0
  • OrgName: Asia Pacific Network Information Centre
  • OrgId: APNIC
  • Address: PO Box 3646
  • City: South Brisbane
  • StateProv: QLD
  • PostalCode: 4101
  • Country: AU
  • RegDate:
  • Updated: 2012-01-24
  • Ref: https://rdap.arin.net/registry/entity/APNIC
  • OrgAbuseHandle: AWC12-ARIN
  • OrgAbuseName: APNIC Whois Contact
  • OrgAbusePhone: +61 7 3858 3188
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • OrgTechHandle: AWC12-ARIN
  • OrgTechName: APNIC Whois Contact
  • OrgTechPhone: +61 7 3858 3188
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • inetnum: 139.59.80.0 - 139.59.95.255
  • netname: DIGITALOCEAN-AP
  • descr: DigitalOcean, LLC
  • country: IN
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • abuse-c: AD699-AP
  • status: ASSIGNED NON-PORTABLE
  • mnt-by: MAINT-DIGITALOCEAN-AP
  • mnt-irt: IRT-DIGITALOCEAN-AP
  • last-modified: 2020-05-31T21:36:27Z
  • irt: IRT-DIGITALOCEAN-AP
  • address: 101 Avenue of the Americas, 10th Floor, New York NY 10013
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • mnt-by: MAINT-DIGITALOCEAN-AP
  • last-modified: 2023-03-15T13:08:34Z
  • role: ABUSE DIGITALOCEANAP
  • address: 101 Avenue of the Americas, 10th Floor, New York NY 10013
  • country: ZZ
  • phone: +000000000
  • e-mail: [email protected]
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • nic-hdl: AD699-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2023-03-15T13:10:39Z
  • role: Digital Ocean Inc administrator
  • address: 101 Avenue of th Americas, 10th Floor, New York NY 10013
  • country: US
  • phone: +1 646 397 8051
  • fax-no: +1 646 397 8051
  • e-mail: [email protected]
  • admin-c: DOIA2-AP
  • tech-c: DOIA2-AP
  • nic-hdl: DOIA2-AP
  • mnt-by: MAINT-DIGITALOCEAN-AP
  • last-modified: 2015-04-02T20:27:52Z

Links to attack logs

** bruteforce-ip-list-2020-07-14 bruteforce-ip-list-2020-06-25 ** bruteforce-ip-list-2020-05-29 **