Go
165.160.13.20
is probably an
Open Proxy
used by
Hackers
95 %
United States
Report Abuse
9attacks reported
6Hacking
1Brute-Force
1Fraud OrdersPhishingFraud VoIPEmail SpamHackingSpoofingBad Web BotExploited Host
1Fraud OrdersEmail SpamPhishing
6abuse reported
4Email Spam
1Email SpamBrute-Force
1Email SpamHacking
4malware reported
4Malware
3reputation reported
3uncategorized
2organizations reported
2uncategorized
1anonymizers reported
1Open Proxy
from 11 distinct reporters
and 6 distinct sources : blueliv.com, FireHOL, hpHosts, Bambenek Consulting, AbuseIPDB, ip-46.com
165.160.13.20 was first signaled at 2018-07-06 09:21 and last record was at 2019-11-22 12:40.
IP

165.160.13.20

Organization
Corporation Service Company
Localisation
United States
Delaware, Wilmington
NetRange : First & Last IP
165.160.0.0 - 165.160.255.255
Network CIDR
165.160.0.0/16

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-04-16 09:50 attacks Hacking AbuseIPDB links company. http://linkcontrols.com/ Server Software Apache linkcontrols.com DNS Resource Records Name Type Data linkcontrols.com A 208.91.197.26 l
2019-04-16 09:33 attacks Hacking AbuseIPDB well known hacking admin/akamai.net MX 100 mx0a-00190b01.pphosted.com akamai.net MX 100 mx0b-00190b01.pphosted.com akamai.net NS a1-193.akamaitech.net
2019-04-16 07:25 attacks Hacking AbuseIPDB ISP/hostname admin/links to tampered tv/and hacking/local/known -tampered Samsung not internet able/unless tampered with via browser hackers/kenable.c
2019-03-21 01:31 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=44867 . dpt=443 . src=xx.xx.4.90 . dst=165.160.13.20 . (listed on Blocklist de Mar 20 18:33) (489)
2019-02-27 07:48 abuse Email SpamHacking AbuseIPDB  
2019-02-02 08:42 attacks Hacking AbuseIPDB ad webworkers/and green font in bing search engine/or ww2.bing.com/net/Any IO likely hacking/as is .to/.info/.co recommend blocking -ad web worker hac
2019-02-02 08:00 attacks Hacking AbuseIPDB MISSING domain useful/DIRECT-KT-VIZIOTV 02:6B:9E:1E:3E:BB direct links to illegally installed devices/actiontec.com as expected a hacking tech involve
2018-10-15 02:06 attacks Brute-Force AbuseIPDB  
2018-10-05 20:28 abuse Email Spam AbuseIPDB  
2018-09-19 23:00 abuse Email Spam AbuseIPDB Spam (waterstones.com, Sep 7 17:05)
2018-09-07 07:00 abuse Email Spam AbuseIPDB Spam (waterstones.com, Sep 7 17:05)
2018-08-13 01:29 abuse Email Spam AbuseIPDB  
2018-07-06 09:21 attacks Fraud OrdersPhishingFraud VoIPEmail Spam AbuseIPDB  
2019-03-29 18:21 attacks Hacking blueliv_crimeserver_last_30d blueliv.com  
2019-03-29 18:23 organizations coinbl_hosts  
2019-03-29 18:32 anonymizers Open Proxy firehol_proxies FireHOL  
2019-03-29 18:35 organizations hphosts_ats  
2019-03-29 18:35 malware Malware hphosts_emd hpHosts  
2019-03-29 18:35 reputation hphosts_fsa  
2019-03-29 18:35 reputation hphosts_pha  
2019-03-29 18:36 reputation hphosts_psh  
2019-03-29 18:42 malware Malware ransomware_feed  
2019-08-05 12:54 malware Malware bambenek_c2 Bambenek Consulting  
2019-08-05 12:54 malware Malware bambenek_suppobox Bambenek Consulting  
2019-11-22 12:40 attacks Fraud OrdersEmail SpamPhishing ip-46.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

NetRange: 165.160.0.0 - 165.160.255.255
CIDR: 165.160.0.0/16
NetName: CSCNET
NetHandle: NET-165-160-0-0-1
Parent: NET165 (NET-165-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: Corporation Service Company (CORPO-9-Z)
RegDate: 1993-06-23
Updated: 2012-04-02
Ref: https://rdap.arin.net/registry/ip/ 165.160.0.0

OrgName: Corporation Service Company
OrgId: CORPO-9-Z
Address: 251 Little Falls Drive
City: Wilmington
StateProv: DE
PostalCode: 19808
Country: US
RegDate: 2008-01-11
Updated: 2017-10-23
Ref: https://rdap.arin.net/registry/entity/CORPO-9-Z

OrgTechHandle: ARINT19-ARIN
OrgTechName: ArinTech
OrgTechPhone: +1-302-636-5400
OrgTechEmail: arintech@cscinfo.com
OrgTechRef: https://rdap.arin.net/registry/entity/ARINT19-ARIN

OrgAbuseHandle: ARINT19-ARIN
OrgAbuseName: ArinTech
OrgAbusePhone: +1-302-636-5400
OrgAbuseEmail: arintech@cscinfo.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ARINT19-ARIN

RTechHandle: ARINT19-ARIN
RTechName: ArinTech
RTechPhone: +1-302-636-5400
RTechEmail: arintech@cscinfo.com
RTechRef: https://rdap.arin.net/registry/entity/ARINT19-ARIN
most specific ip range is highlighted
Updated : 2020-01-16