110.172.137.20 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 110.172.137.20 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Likely Malicious Host 🟠 55/100

Host and Network Information

  • Mitre ATT&CK IDs: T1003 - OS Credential Dumping, T1005 - Data from Local System, T1008 - Fallback Channels, T1011 - Exfiltration Over Other Network Medium, T1016 - System Network Configuration Discovery, T1025 - Data from Removable Media, T1027 - Obfuscated Files or Information, T1036 - Masquerading, T1048 - Exfiltration Over Alternative Protocol, T1049 - System Network Connections Discovery, T1053 - Scheduled Task/Job, T1055 - Process Injection, T1056 - Input Capture, T1057 - Process Discovery, T1059 - Command and Scripting Interpreter, T1071 - Application Layer Protocol, T1082 - System Information Discovery, T1083 - File and Directory Discovery, T1087 - Account Discovery, T1091 - Replication Through Removable Media, T1092 - Communication Through Removable Media, T1095 - Non-Application Layer Protocol, T1098 - Account Manipulation, T1102 - Web Service, T1105 - Ingress Tool Transfer, T1112 - Modify Registry, T1114 - Email Collection, T1119 - Automated Collection, T1202 - Indirect Command Execution, T1203 - Exploitation for Client Execution, T1217 - Browser Bookmark Discovery, T1219 - Remote Access Software, T1486 - Data Encrypted for Impact, T1489 - Service Stop, T1490 - Inhibit System Recovery, T1497 - Virtualization/Sandbox Evasion, T1518 - Software Discovery, T1539 - Steal Web Session Cookie, T1543 - Create or Modify System Process, T1546 - Event Triggered Execution, T1547 - Boot or Logon Autostart Execution, T1548 - Abuse Elevation Control Mechanism, T1552 - Unsecured Credentials, T1553 - Subvert Trust Controls, T1555 - Credentials from Password Stores, T1562 - Impair Defenses, T1564 - Hide Artifacts, T1566 - Phishing, T1568 - Dynamic Resolution, T1569 - System Services, T1571 - Non-Standard Port, T1574 - Hijack Execution Flow, T1613 - Container and Resource Discovery
  • Tags: anna paula, appdata, associated, bifrost, cerber, currc3adculo, darkcomet, defender, dropper, express, from email, headers, leave, local, lokibot, malspam email, malware, msi file, ramnit, service, shell, system32, t1027, ta0002, ta0003, ta0004, ta0005, ta0007, ta0011, temp, tinba, tofsee, tools, trojan, tuesday, upatre, utf8, zip archive, zusy

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: blocklist_net_ua, stopforumspam_365d

  • Country: India
  • Network: AS133647 elxire data services pvt. ltd.
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy

Malware Detected on Host

Count: 22 1453442508a0dc33844ca8a2eac5a915b9e26feba1f07d99c1d5bf9799e314c3 3d775f1f2da385ed73d988930d9c9675fc2e466098bb5f19c8501a723e14f437 e6edcaa1ffca9203bccb5bd16489585e73503570f19cc11f012047430e6b7d11 11c944b62f044f94bdc3c99762551c6e6265ab71f08b58091ad54ce9efee940c 9890dddc8087d395c5eab7410880b35d3e790d11ab08f2b4a039818e814f21ed 0db2269be98083bdfceacd93289cc457256f8fd14750b3edd633f608a0e74e3e c2deb68c4498b64b9e9839f8a77f8e91c09facbdad1c70c428e8ea447dc1ffff 7b1197cfb77a2c47a0cd8adb718ab7674d8556086f0769d498cabb73715c36a0 13641013bd320169c77ce7dc3dbe1a25bd4289108ce63bc2ce0b7100011ba434 9d8a148b40e15d1a374ec81fb4aad1e09c8fc7cfee33c2141cae6b47c0b70983

Map

Whois Information

  • inetnum: 110.172.137.0 - 110.172.137.255
  • netname: Xenox
  • descr: Raipur
  • country: IN
  • admin-c: NA760-AP
  • tech-c: NA760-AP
  • status: ASSIGNED NON-PORTABLE
  • mnt-by: MAINT-IN-WPISPL
  • mnt-irt: IRT-WORLDPHONE-IN
  • last-modified: 2019-12-05T07:16:38Z
  • irt: IRT-WORLDPHONE-IN
  • address: F1/9, Okhla Industrial Area, Phase -1, New Delhi -110020
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: NA760-AP
  • tech-c: NA760-AP
  • mnt-by: MAINT-IN-WPISPL
  • last-modified: 2019-12-04T05:31:41Z
  • role: Network Admin
  • address: F1/9, Okhla Industrial Area, Phase -1, New Delhi -110020
  • country: IN
  • phone: +91-11-2690 2000
  • e-mail: [email protected]
  • admin-c: RR918-AP
  • tech-c: RR918-AP
  • nic-hdl: NA760-AP
  • mnt-by: MAINT-IN-WPISPL
  • last-modified: 2019-12-04T05:29:22Z
  • route: 110.172.137.0/24
  • descr: worldphone
  • origin: AS133647
  • mnt-by: MAINT-IN-WPISPL
  • last-modified: 2020-08-28T11:56:35Z

Links to attack logs

anonymous-proxy-ip-list-2023-06-22