Go
52.255.141.19
is a
Hacker
100 %
United States
Report Abuse
10attacks reported
7Port Scan
2Brute-ForceMailserver Attack
1uncategorized
1organizations reported
1uncategorized
from 2 distinct reporters
and 2 distinct sources : BadIPs.com, AbuseIPDB
52.255.141.19 was first signaled at 2019-03-29 18:23 and last record was at 2020-08-02 14:00.
IP

52.255.141.19

Organization
Microsoft Corporation
Localisation
United States
Virginia, Washington
NetRange : First & Last IP
52.224.0.0 - 52.255.255.255
Network CIDR
52.224.0.0/11

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2020-08-01 10:31 attacks Port Scan AbuseIPDB (pop3d) Failed POP3 login from 52.255.141.19 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug
2020-08-01 04:18 attacks Port Scan AbuseIPDB (pop3d) Failed POP3 login from 52.255.141.19 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug
2020-07-31 13:22 attacks Port Scan AbuseIPDB (pop3d) Failed POP3 login from 52.255.141.19 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug
2020-07-31 08:32 attacks Port Scan AbuseIPDB (pop3d) Failed POP3 login from 52.255.141.19 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul
2020-07-31 05:09 attacks Port Scan AbuseIPDB (pop3d) Failed POP3 login from 52.255.141.19 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul
2020-07-31 01:41 attacks Port Scan AbuseIPDB (pop3d) Failed POP3 login from 52.255.141.19 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul
2020-07-30 22:15 attacks Port Scan AbuseIPDB (pop3d) Failed POP3 login from 52.255.141.19 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul
2020-08-02 13:59 attacks bi_any_0_1d BadIPs.com  
2020-08-02 14:00 attacks Brute-ForceMailserver Attack bi_dovecot-pop3imap_0_1d BadIPs.com  
2020-08-02 14:00 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-03-29 18:23 organizations datacenters  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

NetRange: 52.224.0.0 - 52.255.255.255
CIDR: 52.224.0.0/11
NetName: MSFT
NetHandle: NET-52-224-0-0-1
Parent: NET52 (NET-52-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2015-11-24
Updated: 2015-11-24
Ref: https://rdap.arin.net/registry/ip/ 52.224.0.0

OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-09
Updated: 2017-01-28
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT

OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN
most specific ip range is highlighted
Updated : 2020-08-02