110.164.126.99 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 110.164.126.99 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 45/100

Host and Network Information

  • Tags: blacklist, botnet, brazil, canada, china, cyber security, egypt, germany, hong kong, india, indonesia, ioc, malicious, Malicious IP, mirai, Nextray, nmap, phishing, port-scan, probing, scan, scanning, singapore, smb, tcp, united, vietnam, webscan, webscanner bruteforce web app attack

  • View other sources: Spamhaus VirusTotal

  • Country: Thailand
  • Network: AS45758 triple t broadband public company limited
  • Noticed: 42 times
  • Protocols Attacked: SSH
  • Countries Attacked: Australia, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Malaysia, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: device-438edfc1-9999-416a-872d-ee97a788c25e.remotewd.com

Malware Detected on Host

Count: 1 4098c8a10acf77b3c753acd602b99ab0e88f050f1e72edb23c06bc0500926eeb

Open Ports Detected

1701 1723 2000 53 80 8000 8043 8080 8088 82 8443 8888 9000 9080

CVEs Detected

CVE-2006-20001 CVE-2008-0455 CVE-2010-1452 CVE-2010-1623 CVE-2010-2068 CVE-2011-0419 CVE-2011-3192 CVE-2011-3348 CVE-2011-3368 CVE-2011-3607 CVE-2011-3639 CVE-2011-4317 CVE-2011-4415 CVE-2012-0031 CVE-2012-0053 CVE-2012-0883 CVE-2012-2687 CVE-2012-3499 CVE-2012-4557 CVE-2012-4558 CVE-2013-1862 CVE-2013-1896 CVE-2013-4352 CVE-2013-5704 CVE-2013-6438 CVE-2014-0098 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2014-3523 CVE-2014-3581 CVE-2014-8109 CVE-2015-0228 CVE-2015-3183 CVE-2015-3184 CVE-2015-3185 CVE-2015-9253 CVE-2016-0736 CVE-2016-2161 CVE-2016-4975 CVE-2016-5387 CVE-2016-8612 CVE-2016-8743 CVE-2017-15710 CVE-2017-15715 CVE-2017-3167 CVE-2017-3169 CVE-2017-7272 CVE-2017-7679 CVE-2017-7963 CVE-2017-9120 CVE-2017-9788 CVE-2017-9798 CVE-2018-1283 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-1312 CVE-2018-17199 CVE-2018-19395 CVE-2018-19396 CVE-2019-0217 CVE-2019-0220 CVE-2019-10092 CVE-2019-10098 CVE-2019-11043 CVE-2019-11044 CVE-2019-11045 CVE-2019-11046 CVE-2019-11047 CVE-2019-11048 CVE-2019-11050 CVE-2019-17567 CVE-2019-9020 CVE-2019-9021 CVE-2019-9022 CVE-2019-9023 CVE-2019-9024 CVE-2019-9637 CVE-2019-9638 CVE-2019-9639 CVE-2019-9641 CVE-2019-9675 CVE-2020-11985 CVE-2020-13938 CVE-2020-1927 CVE-2020-1934 CVE-2020-35452 CVE-2020-7059 CVE-2020-7060 CVE-2020-7061 CVE-2020-7062 CVE-2020-7063 CVE-2020-7064 CVE-2020-7066 CVE-2020-7067 CVE-2020-7068 CVE-2020-7069 CVE-2020-7070 CVE-2021-26690 CVE-2021-26691 CVE-2021-34798 CVE-2021-3618 CVE-2021-39275 CVE-2021-40438 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 CVE-2022-26377 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31628 CVE-2022-31629 CVE-2022-31813 CVE-2022-36760 CVE-2022-37436 CVE-2022-37454 CVE-2023-25690 CVE-2023-44487

Map

Whois Information

  • inetnum: 110.164.64.0 - 110.164.127.255
  • netname: TTBP-TH
  • descr: Triple T Broadband Public Company Limited
  • country: TH
  • admin-c: TTBP1-AP
  • tech-c: TTBP1-AP
  • abuse-c: AT1597-AP
  • status: ALLOCATED NON-PORTABLE
  • mnt-by: MAINT-TTBP-TH
  • mnt-irt: IRT-TTBP-TH
  • last-modified: 2021-12-21T13:36:13Z
  • irt: IRT-TTBP-TH
  • address: Jasmine International Public Company Limited,Pakkret Nonthaburi 11120
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: TTBP1-AP
  • tech-c: TTBP1-AP
  • mnt-by: MAINT-TTBP-TH
  • last-modified: 2022-09-02T09:36:30Z
  • role: ABUSE TTBPTH
  • address: Jasmine International Public Company Limited,Pakkret Nonthaburi 11120
  • country: ZZ
  • phone: +000000000
  • e-mail: [email protected]
  • admin-c: TTBP1-AP
  • tech-c: TTBP1-AP
  • nic-hdl: AT1597-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2022-09-02T15:51:24Z
  • role: Triple T Broadband PCL administrator
  • address: Jasmine International Public Company Limited, Pakkret Nonthaburi 11120
  • country: TH
  • phone: +6621008552
  • e-mail: [email protected]
  • admin-c: TTBP1-AP
  • tech-c: TTBP1-AP
  • nic-hdl: TTBP1-AP
  • mnt-by: MAINT-TTBP-TH
  • last-modified: 2021-07-27T02:31:01Z
  • route: 110.164.0.0/17
  • origin: AS45629
  • descr: Triple T Broadband Public Company Limited
  • mnt-by: MAINT-TTBP-TH
  • last-modified: 2022-04-22T11:17:09Z
  • route: 110.164.0.0/17
  • origin: AS45758
  • descr: Triple T Broadband Public Company Limited
  • mnt-by: MAINT-TTBP-TH
  • last-modified: 2022-04-22T11:17:57Z

Links to attack logs

** nmap-scanning-list-2023-05-27 ** nmap-scanning-list-2023-03-30 **