118.193.16.50 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 118.193.16.50 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Likely Malicious Host 🟠 70/100

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110.004 - Credential Stuffing, T1110 - Brute Force
  • Tags: brute force, bruteforce, Bruteforce, Brute-Force, cowrie, cyber security, ioc, malicious, Nextray, phishing, port 22, rdp, scanners, ssh, SSH, tcp/22, vultr

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: b3b0, haley_ssh

  • Country: Japan
  • Network: AS63199 capitalonline data service co. ltd
  • Noticed: 50 times
  • Protocols Attacked: ssh
  • Countries Attacked: Australia, Canada, Czechia, Denmark, Estonia, France, Germany, Korea Republic of, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Open Ports Detected

111 1723 22 5353 8008

CVEs Detected

CVE-2001-1556 CVE-2002-0257 CVE-2002-0392 CVE-2002-0839 CVE-2002-0840 CVE-2002-0843 CVE-2002-1233 CVE-2002-1658 CVE-2002-2103 CVE-2002-2272 CVE-2003-0020 CVE-2003-0083 CVE-2003-0460 CVE-2003-0542 CVE-2003-0987 CVE-2003-0993 CVE-2003-1418 CVE-2004-0174 CVE-2004-0263 CVE-2004-0940 CVE-2004-0942 CVE-2004-1082 CVE-2004-2343 CVE-2005-3352 CVE-2006-20001 CVE-2006-3918 CVE-2006-5752 CVE-2007-3304 CVE-2007-5000 CVE-2007-6388 CVE-2007-6750 CVE-2008-2939 CVE-2009-1195 CVE-2009-3555 CVE-2010-0010 CVE-2011-3368 CVE-2011-4317 CVE-2013-5697 CVE-2014-0231 CVE-2015-0228 CVE-2016-8612 CVE-2017-9788 CVE-2017-9798 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2021-34798 CVE-2021-39275 CVE-2021-40438 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31813 CVE-2022-37436

Map

Whois Information

  • inetnum: 118.193.16.0 - 118.193.16.255
  • netname: UCUL-JP
  • descr: UCUL-JP
  • country: JP
  • admin-c: UN28-AP
  • tech-c: UN28-AP
  • abuse-c: UA50-AP
  • status: ASSIGNED NON-PORTABLE
  • mnt-by: MAINT-UCUL-HK
  • mnt-irt: IRT-UCUL-HK
  • last-modified: 2022-03-29T02:52:32Z
  • irt: IRT-UCUL-HK
  • address: 401 RAYLAND ST STE 200-A, Reno, NV 89502, USA
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: UN28-AP
  • tech-c: UN28-AP
  • mnt-by: MAINT-UCUL-HK
  • last-modified: 2023-11-20T02:57:12Z
  • role: UCUL Abuse
  • address: 401 RAYLAND ST STE 200-A, Reno, NV 89502, USA
  • country: US
  • phone: +1-213-375-3998
  • e-mail: [email protected]
  • admin-c: UN28-AP
  • tech-c: UN28-AP
  • nic-hdl: UA50-AP
  • mnt-by: MAINT-UCUL-HK
  • last-modified: 2022-03-29T02:45:10Z
  • role: UCUL-HK NETADMIN
  • address: 401 RAYLAND ST STE 200-A, Reno, NV 89502, USA
  • country: HK
  • phone: +1-213-375-3998
  • e-mail: [email protected]
  • admin-c: UN28-AP
  • tech-c: UN28-AP
  • nic-hdl: UN28-AP
  • mnt-by: MAINT-UCUL-HK
  • last-modified: 2022-03-10T03:22:47Z
  • route: 118.193.16.0/24
  • origin: AS63199
  • descr: Capitalonline Data Service (HK) Co., Limited
  • mnt-by: MAINT-CDS-HK
  • last-modified: 2022-04-25T10:10:58Z

Links to attack logs

bruteforce-ip-list-2021-08-17 dotoronto-ssh-bruteforce-ip-list-2023-07-14 vultrparis-ssh-bruteforce-ip-list-2023-08-09 digitaloceansingapore-ssh-bruteforce-ip-list-2023-08-10 digitaloceanfrankfurt-ssh-bruteforce-ip-list-2023-10-31 digitaloceanfrankfurt-ssh-bruteforce-ip-list-2023-08-27 digitaloceanlondon-ssh-bruteforce-ip-list-2024-02-26 digitaloceantoronto-ssh-bruteforce-ip-list-2024-02-09 ** bruteforce-ip-list-2021-08-29 bruteforce-ip-list-2021-08-30 bruteforce-ip-list-2021-08-31 dofrank-ssh-bruteforce-ip-list-2023-07-15 digitaloceantoronto-ssh-bruteforce-ip-list-2023-08-08 vultrwarsaw-ssh-bruteforce-ip-list-2023-12-09 vultrwarsaw-ssh-bruteforce-ip-list-2023-08-22 digitaloceantoronto-ssh-bruteforce-ip-list-2024-01-30 digitaloceanlondon-ssh-bruteforce-ip-list-2023-11-18 digitaloceanlondon-ssh-bruteforce-ip-list-2023-11-22 vultrmadrid-ssh-bruteforce-ip-list-2023-07-01 bruteforce-ip-list-2023-08-03 bruteforce-ip-list-2023-08-04 digitaloceantoronto-ssh-bruteforce-ip-list-2023-08-12 digitaloceanlondon-ssh-bruteforce-ip-list-2024-01-24 bruteforce-ip-list-2021-08-25 vultrmadrid-ssh-bruteforce-ip-list-2023-08-16 digitaloceanfrankfurt-ssh-bruteforce-ip-list-2023-09-19 bruteforce-ip-list-2021-08-18 ** vultrwarsaw-ssh-bruteforce-ip-list-2023-07-17 vultrparis-ssh-bruteforce-ip-list-2023-07-23 digitaloceantoronto-ssh-bruteforce-ip-list-2023-08-22 ** digitaloceanfrankfurt-ssh-bruteforce-ip-list-2024-01-01 bruteforce-ip-list-2023-08-20 digitaloceantoronto-ssh-bruteforce-ip-list-2023-08-24 digitaloceanfrankfurt-ssh-bruteforce-ip-list-2023-09-28 digitaloceanlondon-ssh-bruteforce-ip-list-2024-01-26