121.127.252.15 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 121.127.252.15 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 50/100

Host and Network Information

  • Tags: Bruteforce, Brute-Force, cyber security, ioc, malicious, Nextray, phishing, SSH

  • View other sources: Spamhaus VirusTotal

  • Country: Hong Kong
  • Network: AS64050 bgpnet global asn
  • Noticed: 50 times
  • Protocols Attacked: ssh
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: 987lc.shop s3.openos.cf

Malware Detected on Host

Count: 12 549a53ae163a437f87d7b5c36db34674533b1a36cd427b32575df58814219403 55e5ae6507ceca048e3532a55cc30c8434b890cb0249f5227457256d134a821a 909af43390626758f2154058cf36d80cc8532be08a6e18cc0819f5c2fe80ddd7 b2d0ce73bb8e68932ef5ea47a1ae4dbb016fc7f39bbd151aef45b452c4a6405f c970f58edb99c574f07b717464c8aa7ebc32cc5d7b83d16eebde0419659811c9 ca3c934f011071c5cfb5474639df50d392d65271548bb08b038c37dea31aa4de 05da3a3f89849156ccb143b110483d5762819c4619f0ae83cb15fbd49f0cf2bb ed472a11b2f0f03749e4b2b6be8db04ed1313f2adcd199b9ad17cff07b1262d4 6e886929b004ebd373e9aaca4807a07a857a10cdfb8421f042ea70a7ec048cb3 66fe9cdeadee6040121f53e00cd1d7a0ae609b5832092673dfa146068f16bb50

Open Ports Detected

21 22 80 8888

CVEs Detected

CVE-2016-20012 CVE-2017-15906 CVE-2018-15473 CVE-2018-15919 CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-14145 CVE-2020-15778 CVE-2021-36368 CVE-2021-41617 CVE-2023-38408 CVE-2023-48795 CVE-2023-51384 CVE-2023-51385

Map

Whois Information

  • inetnum: 121.127.252.0 - 121.127.252.255
  • netname: MEGA-II
  • descr: MEGA-II IDC
  • country: HK
  • admin-c: DA179-AP
  • tech-c: DA179-AP
  • abuse-c: AS2098-AP
  • status: ALLOCATED NON-PORTABLE
  • mnt-by: MAINT-HK-SUN
  • mnt-irt: IRT-SUN-HK
  • last-modified: 2020-05-17T23:04:01Z
  • irt: IRT-SUN-HK
  • address: MEGA-II IDC
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: DA179-AP
  • tech-c: DA179-AP
  • mnt-by: MAINT-HK-SNW
  • last-modified: 2024-02-16T07:03:28Z
  • role: ABUSE SUNHK
  • address: MEGA-II IDC
  • country: ZZ
  • phone: +000000000
  • e-mail: [email protected]
  • admin-c: DA179-AP
  • tech-c: DA179-AP
  • nic-hdl: AS2098-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2024-02-16T07:03:51Z
  • person: DNS Administrator
  • nic-hdl: DA179-AP
  • e-mail: [email protected]
  • address: SHA TIN
  • phone: +852-2135-9374
  • country: HK
  • mnt-by: MAINT-HK-SNW
  • abuse-mailbox: [email protected]
  • last-modified: 2020-05-17T14:55:38Z

Links to attack logs

** vultrparis-ssh-bruteforce-ip-list-2023-02-24 dofrank-ssh-bruteforce-ip-list-2023-02-14 ** **