103.99.1.99 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 103.99.1.99 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 17/100

Host and Network Information

  • View other sources: Spamhaus VirusTotal

  • Country: Vietnam
  • Network: AS15399 wananchi group
  • Noticed: 50 times
  • Protcols Attacked: SSH

Malware Detected on Host

Count: 2 04f0710b033015a3e0849535718b5160c361ca5c926ca0ee8557098dc064a49c 04f0710b033015a3e0849535718b5160c361ca5c926ca0ee8557098dc064a49c 04f0710b033015a3e0849535718b5160c361ca5c926ca0ee8557098dc064a49c 04f0710b033015a3e0849535718b5160c361ca5c926ca0ee8557098dc064a49c 5d6edc0da8d9c0f042c022e7e771a535904ab4c8b34f81ffb6b978333fe3ef7d 8c43c85a09cb5da93ae00a6a813805f983ef771df771014d32b36beef5704f15 528ddc399dac6e317f4c43d6a236439b3a0f865a7fb955006acd36918977d79d cbd3d0d7cbdb2aa657ed5ad6418241bf0fccf41390f000f307894f7f38263eff 4d0aabe35a7495b0e51adfebe3bf331cce98c300c73eeb2a49a10c3bd4960249 9f1a684f78ce009f147e01bc68215bb0be868dc5da763d9c531c86d214fc3d37 3a40637d5f3991eb2bb6b6aec3ed9eab45ee8f87e3cd0f05e6e8e25b1de8e31d 3a40637d5f3991eb2bb6b6aec3ed9eab45ee8f87e3cd0f05e6e8e25b1de8e31d e1b3cdbaf7cdea2615e47e8ce4ea25e22f15e8578be39642723313200c855cb5 ca14bd24eadf6bfbbba41dab0d2e65520e6e150bb49bbbe79414ffb6d555c135 5d6edc0da8d9c0f042c022e7e771a535904ab4c8b34f81ffb6b978333fe3ef7d 8c43c85a09cb5da93ae00a6a813805f983ef771df771014d32b36beef5704f15 528ddc399dac6e317f4c43d6a236439b3a0f865a7fb955006acd36918977d79d cbd3d0d7cbdb2aa657ed5ad6418241bf0fccf41390f000f307894f7f38263eff 4d0aabe35a7495b0e51adfebe3bf331cce98c300c73eeb2a49a10c3bd4960249 9f1a684f78ce009f147e01bc68215bb0be868dc5da763d9c531c86d214fc3d37 3a40637d5f3991eb2bb6b6aec3ed9eab45ee8f87e3cd0f05e6e8e25b1de8e31d 3a40637d5f3991eb2bb6b6aec3ed9eab45ee8f87e3cd0f05e6e8e25b1de8e31d e1b3cdbaf7cdea2615e47e8ce4ea25e22f15e8578be39642723313200c855cb5 ca14bd24eadf6bfbbba41dab0d2e65520e6e150bb49bbbe79414ffb6d555c135

Map

Whois Information

  • inetnum: 113.194.0.0 - 113.195.255.255
  • netname: UNICOM-JX
  • descr: China Unicom Jiangxi province network
  • descr: China Unicom
  • country: CN
  • admin-c: CH1302-AP
  • tech-c: CH1302-AP
  • status: ALLOCATED PORTABLE
  • mnt-by: APNIC-HM
  • mnt-lower: MAINT-CNCGROUP-JX
  • mnt-routes: MAINT-CNCGROUP-RR
  • mnt-irt: IRT-CU-CN
  • last-modified: 2016-05-04T00:15:29Z
  • irt: IRT-CU-CN
  • address: No.21,Financial Street
  • address: Beijing,100033
  • address: P.R.China
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: CH1302-AP
  • tech-c: CH1302-AP
  • mnt-by: MAINT-CNCGROUP
  • last-modified: 2017-10-23T05:59:13Z
  • person: ChinaUnicom Hostmaster
  • nic-hdl: CH1302-AP
  • e-mail: [email protected]
  • address: No.21,Jin-Rong Street
  • address: Beijing,100033
  • address: P.R.China
  • phone: +86-10-66259764
  • fax-no: +86-10-66259764
  • country: CN
  • mnt-by: MAINT-CNCGROUP
  • last-modified: 2017-08-17T06:13:16Z
  • route: 113.194.0.0/15
  • descr: CNC Group CHINA169 Jiangxi Province Network
  • country: CN
  • origin: AS4837
  • mnt-by: MAINT-CNCGROUP-RR
  • last-modified: 2008-12-10T04:27:01Z

Links to attack logs

nmap-scanning-list-2022-09-02 nmap-scanning-list-2022-08-31 nmap-scanning-list-2022-09-01 nmap-scanning-list-2022-09-08 nmap-scanning-list-2022-08-30 nmap-scanning-list-2022-09-07 nmap-scanning-list-2022-09-09 nmap-scanning-list-2022-09-03 nmap-scanning-list-2022-09-05 nmap-scanning-list-2022-09-06 nmap-scanning-list-2022-03-03 nmap-scanning-list-2022-03-08 nmap-scanning-list-2022-06-27 nmap-scanning-list-2022-07-14 nmap-scanning-list-2022-07-17 nmap-scanning-list-2022-08-21 nmap-scanning-list-2022-08-23 nmap-scanning-list-2022-08-26 nmap-scanning-list-2022-08-29 nmap-scanning-list-2022-08-22 nmap-scanning-list-2022-06-17 nmap-scanning-list-2022-02-17 nmap-scanning-list-2022-03-05 nmap-scanning-list-2022-03-06 nmap-scanning-list-2022-03-09 nmap-scanning-list-2022-03-14 nmap-scanning-list-2022-06-23 nmap-scanning-list-2022-07-03 nmap-scanning-list-2022-07-15 nmap-scanning-list-2022-09-04 nmap-scanning-list-2022-09-11 nmap-scanning-list-2022-09-12 nmap-scanning-list-2022-07-06 nmap-scanning-list-2022-07-13 nmap-scanning-list-2022-06-15 nmap-scanning-list-2022-06-20 nmap-scanning-list-2022-01-26 nmap-scanning-list-2022-02-15 nmap-scanning-list-2022-03-10 nmap-scanning-list-2022-03-11 nmap-scanning-list-2022-03-18 nmap-scanning-list-2022-07-18 nmap-scanning-list-2022-06-30 nmap-scanning-list-2022-08-04 nmap-scanning-list-2022-08-06 nmap-scanning-list-2022-08-11 nmap-scanning-list-2022-08-28 nmap-scanning-list-2022-07-08 nmap-scanning-list-2022-06-13 nmap-scanning-list-2022-06-19 nmap-scanning-list-2021-06-04 nmap-scanning-list-2021-12-20 nmap-scanning-list-2022-01-22 nmap-scanning-list-2022-01-27 nmap-scanning-list-2022-01-28 nmap-scanning-list-2022-01-29 nmap-scanning-list-2022-02-05 nmap-scanning-list-2022-02-07 nmap-scanning-list-2022-02-12 nmap-scanning-list-2022-02-20 nmap-scanning-list-2022-02-25 nmap-scanning-list-2022-02-27 nmap-scanning-list-2022-07-04