110.34.191.142 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Host and Network Information

  • Tags: nmap, port-scan
  • View other sources: Spamhaus VirusTotal

  • Country: Thailand
  • Network: AS45652 vpls asia
  • Noticed: 2 times
  • Protcols Attacked: SSH
  • Countries Attacked: Australia
  • Passive DNS Results: juncheng-packing.com lkasdlkasdlkasdl.top poaspdoaspod.top gxamtse.blocxxweq.top gxamtse.gebalsd.top

Open Ports Detected

21 443 80

Map

Whois Information

  • inetnum: 110.34.184.0 - 110.34.191.255
  • netname: VPLS-SIN1
  • descr:
  • country: SG
  • admin-c: VINO1-AP
  • tech-c: VINO1-AP
  • status: ASSIGNED NON-PORTABLE
  • mnt-by: MAINT-VPLS-AP
  • mnt-irt: IRT-VPLS-AP
  • abuse-c: AV484-AP
  • geoloc: 1.3373683 103.8935147
  • last-modified: 2023-02-08T05:16:01Z
  • irt: IRT-VPLS-AP
  • address: 1744 W. Katella Ave. Suite 200
  • address: Orange, CA 92867
  • address: USA
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: VINO1-AP
  • tech-c: VINO1-AP
  • mnt-by: MAINT-VPLS-AP
  • last-modified: 2023-02-15T13:08:14Z
  • role: ABUSE VPLSAP
  • address: 1744 W. Katella Ave. Suite 200
  • address: Orange, CA 92867
  • address: USA
  • country: ZZ
  • phone: +000000000
  • e-mail: [email protected]
  • admin-c: VINO1-AP
  • tech-c: VINO1-AP
  • nic-hdl: AV484-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2023-02-15T13:09:29Z
  • role: VPLS INC - Network Operations Center
  • address: 1744 W. Katella Ave. Suite 200
  • country: US
  • phone: +1-714-993-9997
  • fax-no: +1-714-242-7461
  • e-mail: [email protected]
  • admin-c: VINO1-AP
  • tech-c: VINO1-AP
  • nic-hdl: VINO1-AP
  • mnt-by: MAINT-VPLS-AP
  • last-modified: 2023-02-08T04:35:08Z

Links to attack logs

nmap-scanning-list-2020-11-13