Go
139.162.113.212
is a
Hacker
100 %
Japan
Report Abuse
551attacks reported
211
209Port Scan
55Port ScanHacking
36Port ScanBrute-Force
20Brute-Force
9uncategorized
3Brute-ForceMailserver Attack
2HackingBad Web BotWeb App Attack
1DDoS AttackHackingBad Web BotExploited HostWeb App Attack
1Brute-ForceSSH
...
126abuse reported
66Email SpamBrute-Force
53Email SpamHacking
3Email SpamPort Scan
2Email Spam
1Email SpamHackingBrute-Force
1Web SpamPort Scan
4reputation reported
4uncategorized
2spam reported
2Email Spam
1organizations reported
1uncategorized
from 27 distinct reporters
and 5 distinct sources : BadIPs.com, DShield.org, FireHOL, blocklist.net.ua, AbuseIPDB
139.162.113.212 was first signaled at 2017-12-02 11:40 and last record was at 2020-08-04 13:42.
IP

139.162.113.212

Organization
Linode, LLC
Localisation
Japan
Tokyo, Tokyo
NetRange : First & Last IP
139.162.0.0 - 139.162.255.255
Network CIDR
139.162.0.0/16

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2020-08-04 13:42 attacks Port Scan AbuseIPDB Port Scan
2020-08-04 12:50 attacks Port Scan AbuseIPDB firewall-block, port(s): 25/tcp
2020-08-04 08:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:52794 -> port 25, len 44
2020-08-04 02:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:47352 -> port 25, len 40
2020-08-03 23:17 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=56030 . dpt=25 . Found on CINS badguys (45)
2020-08-03 22:30 abuse Email SpamHacking AbuseIPDB IP: 139.162.113.212 Ports affected Simple Mail Transfer (25) Abuse Confidence rating 86% Found in DNSBL('s) ASN Details AS63949 Linode LLC Japan
2020-08-03 21:09 attacks Port Scan AbuseIPDB Port scan denied
2020-08-03 17:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:60154 -> port 25, len 44
2020-08-03 10:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:57211 -> port 25, len 44
2020-08-03 02:10 attacks Brute-Force AbuseIPDB  
2020-08-03 01:42 attacks Port Scan AbuseIPDB " "
2020-08-02 13:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:43821 -> port 25, len 40
2020-08-02 07:21 attacks Port Scan AbuseIPDB Port scan denied
2020-08-02 05:00 attacks Port Scan AbuseIPDB Auto Detect Rule! proto TCP (SYN), 139.162.113.212:47709->gjan.info:25, len 40
2020-08-01 18:50 attacks Port Scan AbuseIPDB firewall-block, port(s): 25/tcp
2020-08-01 13:12 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=53733 . dpt=25 . Found on CINS badguys (103)
2020-08-01 11:30 abuse Email SpamHacking AbuseIPDB IP: 139.162.113.212 Ports affected Simple Mail Transfer (25) Abuse Confidence rating 86% Found in DNSBL('s) ASN Details AS63949 Linode LLC Japan
2020-08-01 02:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:47920 -> port 25, len 40
2020-07-31 07:08 attacks Port Scan AbuseIPDB " "
2020-07-30 21:44 attacks Port Scan AbuseIPDB Jul 31 08:44:37 debian-2gb-nbg1-2 kernel: \[18436363.912320\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.113
2020-07-29 19:30 attacks Port Scan AbuseIPDB firewall-block, port(s): 25/tcp
2020-07-29 19:13 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=54573 . dpt=25 . Found on CINS badguys (28)
2020-07-29 10:30 abuse Email SpamHacking AbuseIPDB IP: 139.162.113.212 Ports affected Simple Mail Transfer (25) Abuse Confidence rating 89% Found in DNSBL('s) ASN Details AS63949 Linode LLC Japan
2020-07-28 20:31 attacks Port Scan AbuseIPDB Port scan denied
2020-07-28 17:30 attacks Port Scan AbuseIPDB firewall-block, port(s): 25/tcp
2020-07-28 17:30 abuse Email SpamHacking AbuseIPDB IP: 139.162.113.212 Ports affected Simple Mail Transfer (25) Abuse Confidence rating 89% Found in DNSBL('s) ASN Details AS63949 Linode LLC Japan
2020-07-27 22:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:51069 -> port 25, len 40
2020-07-27 21:17 attacks Port Scan AbuseIPDB Port scan denied
2020-07-27 20:30 attacks Port Scan AbuseIPDB Auto Detect Rule! proto TCP (SYN), 139.162.113.212:58201->gjan.info:25, len 40
2020-07-27 12:52 attacks Port Scan AbuseIPDB Jul 27 23:52:29 debian-2gb-nbg1-2 kernel: \[18145253.295364\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.113
2020-07-27 08:26 attacks Port Scan AbuseIPDB Port scan denied
2020-07-27 07:52 attacks Port Scan AbuseIPDB Port scan denied
2020-07-27 07:41 attacks Port Scan AbuseIPDB Port scan denied
2020-07-27 05:19 attacks Port Scan AbuseIPDB Port scan denied
2020-07-27 03:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:36463 -> port 25, len 44
2020-07-27 02:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:34013 -> port 25, len 40
2020-07-26 21:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:35918 -> port 25, len 40
2020-07-26 20:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:56127 -> port 25, len 44
2020-07-26 18:36 attacks Port Scan AbuseIPDB Jul 27 05:36:04 debian-2gb-nbg1-2 kernel: \[18079471.795831\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.113
2020-07-26 15:28 attacks Brute-Force AbuseIPDB  
2020-07-26 10:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:46040 -> port 25, len 44
2020-07-26 08:11 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=48266 . dpt=25 . Found on CINS badguys (64)
2020-07-25 19:10 attacks Port Scan AbuseIPDB firewall-block, port(s): 25/tcp
2020-07-25 11:08 abuse Email SpamPort Scan AbuseIPDB PROTO=TCP SPT=36319 DPT=25
2020-07-25 09:54 attacks Port Scan AbuseIPDB Port Scan
2020-07-25 03:30 abuse Email SpamHacking AbuseIPDB IP: 139.162.113.212 Ports affected Simple Mail Transfer (25) Abuse Confidence rating 89% Found in DNSBL('s) ASN Details AS63949 Linode LLC Japan
2020-07-24 22:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:52825 -> port 25, len 44
2020-07-24 10:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:45108 -> port 25, len 44
2020-07-24 10:12 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=53474 . dpt=25 . Found on CINS badguys (86)
2020-07-24 07:39 attacks Port ScanBrute-Force AbuseIPDB <SMTP> TCP (SYN) 139.162.113.212:45052 -> port 25, len 40
2017-12-02 11:40 attacks Port ScanHackingWeb SpamEmail Spam AbuseIPDB Firewall-block on port: 25
2017-12-02 11:42 attacks Port ScanBrute-Force AbuseIPDB  
2017-12-02 11:44 attacks Port ScanBrute-ForceEmail SpamHacking AbuseIPDB SMTP
2017-12-02 11:48 abuse Web SpamPort Scan AbuseIPDB Firewall-block on port: 25
2017-12-02 11:53 attacks Port Scan AbuseIPDB Port scan attempt detected by AWS-CCS, CTS, India
2017-12-02 11:53 attacks Port ScanBrute-ForceSSHWeb App Attack AbuseIPDB Firewall-block on port: 25
2017-12-02 13:48 attacks Port ScanHacking AbuseIPDB Firewall-block on port: 25
2017-12-02 14:03 attacks DDoS AttackPort Scan AbuseIPDB Firewall-block on port: 25
2017-12-02 14:14 abuse Email SpamPort Scan AbuseIPDB Firewall-block on port: 25
2017-12-02 14:19 attacks Port Scan AbuseIPDB Port scan attempt detected by AWS-CCS, CTS, India
2019-03-29 18:18 reputation alienvault_reputation  
2019-03-29 18:19 attacks bi_any_1_7d BadIPs.com  
2019-03-29 18:19 attacks bi_any_2_30d BadIPs.com  
2019-03-29 18:19 attacks bi_any_2_7d BadIPs.com  
2019-03-29 18:20 attacks Brute-ForceMailserver Attack bi_mail_1_7d BadIPs.com  
2019-03-29 18:20 attacks Brute-ForceMailserver Attack bi_mail_2_30d BadIPs.com  
2019-03-29 18:22 reputation ciarmy  
2019-03-29 18:23 attacks dshield_top_1000 DShield.org  
2019-03-29 18:27 attacks firehol_level3 FireHOL  
2019-03-29 18:36 reputation iblocklist_ciarmy_malicious  
2019-03-29 18:41 spam Email Spam normshield_all_spam  
2019-03-29 18:41 spam Email Spam normshield_high_spam  
2019-03-29 18:53 reputation turris_greylist  
2019-05-28 23:20 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2019-05-28 23:31 attacks firehol_level4 FireHOL  
2019-07-28 20:55 attacks bi_any_0_1d BadIPs.com  
2019-07-28 20:55 attacks bi_any_2_1d BadIPs.com  
2019-07-28 20:56 attacks bi_assp_0_1d BadIPs.com  
2019-07-28 20:56 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-03-29 18:23 organizations datacenters  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

whois.ripe.net.



inetnum: 139.162.0.0 - 139.162.255.255
netname: EU-LINODE-20141229
descr: 139.162.0.0/16
org: ORG-LL198-RIPE
country: US
admin-c: TA2589-RIPE
tech-c: TA2589-RIPE
tech-c: LA538-RIPE
status: LEGACY
remarks: Please send abuse reports to abuse@linode.com
mnt-by: linode-leg-mnt
created: 2004-02-02T16:20:09Z
last-modified: 2019-12-04T13:14:16Z
source: RIPE

organisation: ORG-LL198-RIPE
org-name: Linode, LLC
org-type: OTHER
address: 329 E. Jimmie Leeds Road, Suite A, Galloway, NJ 08205
abuse-c: AR31889-RIPE
mnt-ref: linode-leg-mnt
mnt-by: linode-leg-mnt
created: 2015-04-20T03:09:43Z
last-modified: 2017-10-30T14:40:35Z
source: RIPE # Filtered

person: Linode Abuse Support
address: 329 E. Jimmie Leeds Road, Suite A, Galloway, NJ 08205, USA
phone: +16093807100
nic-hdl: LA538-RIPE
mnt-by: Linode-mnt
created: 2009-11-11T15:16:50Z
last-modified: 2017-10-30T22:07:33Z
source: RIPE

person: Thomas Asaro
address: 329 E. Jimmie Leeds Road, Suite A, Galloway, NJ 08205, USA
phone: +16093807504
nic-hdl: TA2589-RIPE
mnt-by: Linode-mnt
created: 2009-11-02T17:17:56Z
last-modified: 2014-11-20T18:51:15Z
source: RIPE
most specific ip range is highlighted
Updated : 2020-08-02