i'm not sure about the source port (i think it can vary from host to host), but destination port 139 is part of windows' netbios stuff... so unfortunately it's normal for your firewall to be blocking incoming 139/tcp packets (among others) from windows boxes (and worms) all night and day...
http://www.iss.net/security_center/a...39/default.htm
if you don't wanna see them get logged just add a rule to block them silently before they hit the log rule... for example:
Code:
iptables -I INPUT -p TCP --dport 139 -m state --state NEW -j DROP
just my two cents...