103.85.171.154 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110 - Brute Force, T1110.004 - Credential Stuffing
  • Tags: Bruteforce, Nextray, SSH, aws, brute force, bruteforce, cowrie, cyber security, fail2ban, ioc, la, lafusioncenter, louisiana, malicious, phishing, scanners, ssh, tsec
  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: haley_ssh

  • Country: China
  • Network: AS4847 china networks inter-exchange
  • Noticed: 20 times
  • Protcols Attacked: ssh
  • Countries Attacked: Australia, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Open Ports Detected

5222 60001 6004 8098 8554 8888 9000 9003 9098 9102

CVEs Detected

CVE-2006-20001 CVE-2007-6750 CVE-2008-2364 CVE-2008-2939 CVE-2009-1195 CVE-2009-1891 CVE-2009-3094 CVE-2009-3095 CVE-2009-3555 CVE-2010-0425 CVE-2010-0434 CVE-2011-0419 CVE-2011-3192 CVE-2011-3368 CVE-2011-3607 CVE-2011-3639 CVE-2011-4317 CVE-2011-4415 CVE-2012-0031 CVE-2012-0053 CVE-2013-1862 CVE-2014-0231 CVE-2015-0228 CVE-2015-3183 CVE-2016-20012 CVE-2016-8612 CVE-2017-15906 CVE-2017-9788 CVE-2017-9798 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-15473 CVE-2018-15919 CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-14145 CVE-2020-15778 CVE-2021-34798 CVE-2021-36368 CVE-2021-39275 CVE-2021-40438 CVE-2021-41617 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31813 CVE-2022-37436

Map

Whois Information

  • inetnum: 103.85.168.0 - 103.85.171.255
  • netname: BEIKUAN
  • descr: Beijing Beikuan Network Co,Ltd
  • descr: Huilongguan Longxing Park West Area 29-2-5-3
  • descr: Changping District, Beijing
  • country: CN
  • admin-c: ZM1396-AP
  • tech-c: ZM1396-AP
  • abuse-c: AC1601-AP
  • status: ALLOCATED PORTABLE
  • mnt-by: MAINT-CNNIC-AP
  • mnt-lower: MAINT-CNNIC-AP
  • mnt-irt: IRT-CNNIC-CN
  • last-modified: 2021-06-16T01:32:16Z
  • irt: IRT-CNNIC-CN
  • address: Beijing, China
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: IP50-AP
  • tech-c: IP50-AP
  • mnt-by: MAINT-CNNIC-AP
  • last-modified: 2021-06-16T01:39:57Z
  • role: ABUSE CNNICCN
  • address: Beijing, China
  • country: ZZ
  • phone: +000000000
  • e-mail: [email protected]
  • admin-c: IP50-AP
  • tech-c: IP50-AP
  • nic-hdl: AC1601-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2020-05-14T11:19:01Z
  • person: Xiangqin Hong
  • address: Huilongguan Longxing Park West Area 29-2-5-3
  • address: Changping District, Beijing
  • country: CN
  • phone: +86-13370180077
  • e-mail: [email protected]
  • nic-hdl: ZM1396-AP
  • mnt-by: MAINT-CNNIC-AP
  • last-modified: 2015-10-20T05:20:01Z

Links to attack logs

bruteforce-ip-list-2021-03-29 bruteforce-ip-list-2021-04-25 aws-ssh-bruteforce-ip-list-2021-04-20

Links to attack logs

bruteforce-ip-list-2021-03-29 bruteforce-ip-list-2021-04-25 aws-ssh-bruteforce-ip-list-2021-04-20