IP address


--139.59.105.64bk8id.pro
Shodan(more info)
Passive DNS
Tags:
IP blacklists
blocklist.de web-login
139.59.105.64 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2025-04-30 10:05:05.280000
Was present on blacklist at: 2025-04-28 16:05, 2025-04-28 22:05, 2025-04-29 04:05, 2025-04-29 10:05, 2025-04-29 22:05, 2025-04-30 04:05, 2025-04-30 10:05
Spamhaus XBL CBL
139.59.105.64 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-05-05 16:05:20.748000
Was present on blacklist at: 2025-04-28 16:05, 2025-05-05 16:05
blocklist.de Apache
139.59.105.64 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-04-30 10:05:05.342000
Was present on blacklist at: 2025-04-28 16:05, 2025-04-28 22:05, 2025-04-29 04:05, 2025-04-29 10:05, 2025-04-29 22:05, 2025-04-30 04:05, 2025-04-30 10:05
AbuseIPDB
139.59.105.64 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-04-30 04:00:00.787000
Was present on blacklist at: 2025-04-30 04:00
Blocklist.net.ua
139.59.105.64 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-07 10:15:02.336000
Was present on blacklist at: 2025-05-01 22:15, 2025-05-02 02:15, 2025-05-02 06:15, 2025-05-02 10:15, 2025-05-02 14:15, 2025-05-02 18:15, 2025-05-02 22:15, 2025-05-03 02:15, 2025-05-03 06:15, 2025-05-03 10:15, 2025-05-03 14:15, 2025-05-03 18:15, 2025-05-03 22:15, 2025-05-04 02:15, 2025-05-04 06:15, 2025-05-04 10:15, 2025-05-04 14:15, 2025-05-04 18:15, 2025-05-04 22:15, 2025-05-05 02:15, 2025-05-05 06:15, 2025-05-05 10:15, 2025-05-05 14:15, 2025-05-05 18:15, 2025-05-05 22:15, 2025-05-06 02:15, 2025-05-06 06:15, 2025-05-06 10:15, 2025-05-06 14:15, 2025-05-06 18:15, 2025-05-06 22:15, 2025-05-07 02:15, 2025-05-07 06:15, 2025-05-07 10:15
Origin AS
AS14061 - DIGITALOCEAN-ASN
BGP Prefix
139.59.96.0/20
geo
Singapore, Singapore
🕑 Asia/Singapore
hostname
bk8id.pro
Address block ('inetnum' or 'NetRange' in whois database)
139.59.0.0 - 139.59.255.255
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80, 443
Tags: cloud, self-signed
CPEs: cpe:/o:canonical:ubuntu_linux, cpe:/a:openbsd:openssh:9.6p1
ts_added
2025-04-28 16:05:17.359000
ts_last_update
2025-05-07 10:36:07.038000

Warden event timeline

DShield event timeline

Presence on blacklists