IP address


.111139.59.0.128
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
DataPlane SSH login
139.59.0.128 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-18 15:10:06.611000
Was present on blacklist at: 2025-12-15 15:10, 2025-12-15 19:10, 2025-12-16 03:10, 2025-12-16 07:10, 2025-12-16 15:10, 2025-12-16 19:10, 2025-12-17 03:10, 2025-12-17 07:10, 2025-12-17 15:10, 2025-12-17 19:10, 2025-12-18 03:10, 2025-12-18 07:10, 2025-12-18 15:10
blocklist.de SSH
139.59.0.128 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-15 17:05:00.328000
Was present on blacklist at: 2025-12-15 17:05
blocklist.de web-login
139.59.0.128 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-17 23:05:00.368000
Was present on blacklist at: 2025-12-15 23:05, 2025-12-16 05:05, 2025-12-16 11:05, 2025-12-16 17:05, 2025-12-16 23:05, 2025-12-17 05:05, 2025-12-17 11:05, 2025-12-17 17:05, 2025-12-17 23:05
blocklist.de Apache
139.59.0.128 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-17 23:05:05.270000
Was present on blacklist at: 2025-12-15 23:05, 2025-12-16 05:05, 2025-12-16 11:05, 2025-12-16 17:05, 2025-12-16 23:05, 2025-12-17 05:05, 2025-12-17 11:05, 2025-12-17 17:05, 2025-12-17 23:05
BruteForceBlocker
139.59.0.128 is listed on the BruteForceBlocker blacklist.

Description: Daniel Gerzo's BruteForceBlocker. The list is made by perl script,<br>that works along with pf - OpenBSD's firewall and it's main<br>purpose is to block SSH bruteforce attacks via firewall.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-18 03:52:00.241000
Was present on blacklist at: 2025-12-16 03:52, 2025-12-17 03:52, 2025-12-18 03:52
Warden events (20)
2025-12-15
ReconScanning (node.4dc198): 9
ReconScanning (node.368407): 5
2025-12-06
ReconScanning (node.86eb21): 3
2025-12-05
ReconScanning (node.86eb21): 2
ReconScanning (node.f90c6b): 1
DShield reports (IP summary, reports)
2025-12-15
Number of reports: 20
Distinct targets: 4
Origin AS
AS14061 - DIGITALOCEAN-ASN
BGP Prefix
139.59.0.0/20
geo
India, Bengaluru
🕑 Asia/Kolkata
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
139.59.0.0 - 139.59.255.255
last_activity
2025-12-15 15:40:18
last_warden_event
2025-12-15 15:40:18
rep
0.11070905412946427
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80, 443
Tags: eol-product, cloud
CPEs: cpe:/o:linux:linux_kernel, cpe:/a:zeit:next.js, cpe:/a:facebook:react, cpe:/a:openbsd:openssh:9.9p1, cpe:/a:f5:nginx:1.26.3, cpe:/o:canonical:ubuntu_linux
ts_added
2025-12-05 20:37:59.698000
ts_last_update
2025-12-18 15:15:50.031000

Warden event timeline

DShield event timeline

Presence on blacklists