130.193.125.98 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Known Malicious Host 🔴 72/100

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110 - Brute Force, T1110.004 - Credential Stuffing
  • Tags: Brute-Force, Bruteforce, SSH, brute-force, bruteforce, cowrie, digital ocean, last update, scanners, ssh, tcp, unique count, windows server
  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: blocklist_de, blocklist_de_ssh

  • Country: Armenia
  • Network: AS49800 gnc-alfa cjsc
  • Noticed: 6 times
  • Protcols Attacked: ssh
  • Countries Attacked: Canada
  • Passive DNS Results: a22d1c70df64d10ac0f31f71f51b4fc7c.asuscomm.com

Open Ports Detected

443 7778 8443 8889 9091

CVEs Detected

CVE-2016-20012 CVE-2017-15906 CVE-2017-3735 CVE-2017-3736 CVE-2017-3737 CVE-2017-3738 CVE-2018-0732 CVE-2018-0734 CVE-2018-0737 CVE-2018-0739 CVE-2018-15473 CVE-2018-15919 CVE-2018-20685 CVE-2018-5407 CVE-2019-1547 CVE-2019-1551 CVE-2019-1552 CVE-2019-1559 CVE-2019-1563 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-14145 CVE-2020-15778 CVE-2020-1968 CVE-2020-1971 CVE-2021-23840 CVE-2021-23841 CVE-2021-36368 CVE-2021-3712 CVE-2021-4160 CVE-2021-41617 CVE-2022-0778 CVE-2022-1292 CVE-2022-2068 CVE-2022-4304 CVE-2023-0215 CVE-2023-0286

Map

Whois Information

  • NetRange: 130.193.0.0 - 130.193.255.255
  • CIDR: 130.193.0.0/16
  • NetName: RIPE-ERX-130-193-0-0
  • NetHandle: NET-130-193-0-0-1
  • Parent: NET130 (NET-130-0-0-0-0)
  • NetType: Early Registrations, Transferred to RIPE NCC
  • OriginAS:
  • Organization: RIPE Network Coordination Centre (RIPE)
  • RegDate: 2010-11-03
  • Updated: 2010-11-17
  • Comment: These addresses have been further assigned to users in
  • Comment: the RIPE NCC region. Contact information can be found in
  • Ref: https://rdap.arin.net/registry/ip/130.193.0.0
  • OrgName: RIPE Network Coordination Centre
  • OrgId: RIPE
  • Address: P.O. Box 10096
  • City: Amsterdam
  • StateProv:
  • PostalCode: 1001EB
  • Country: NL
  • RegDate:
  • Updated: 2013-07-29
  • Ref: https://rdap.arin.net/registry/entity/RIPE
  • OrgAbuseHandle: ABUSE3850-ARIN
  • OrgAbuseName: Abuse Contact
  • OrgAbusePhone: +31205354444
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
  • OrgTechHandle: RNO29-ARIN
  • OrgTechName: RIPE NCC Operations
  • OrgTechPhone: +31 20 535 4444
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
  • inetnum: 130.193.125.96 - 130.193.125.99
  • netname: VAHAGENEIVAZIAN-AM-NET
  • descr: Vahagen Eivazian
  • country: AM
  • admin-c: GAR131-RIPE
  • tech-c: GAR131-RIPE
  • status: ASSIGNED PA
  • mnt-by: MNT-GNC
  • mnt-lower: MNT-GNC
  • mnt-routes: MNT-GNC
  • created: 2013-08-02T12:05:56Z
  • last-modified: 2013-08-02T12:05:56Z
  • role: GNC Admin Role
  • address: Armenia, Abovyan, Khakhaghutyan str. 1
  • admin-c: MT13409-RIPE
  • tech-c: AA8916-RIPE
  • tech-c: MK10494-RIPE
  • abuse-mailbox: [email protected]
  • mnt-by: MNT-GNC
  • nic-hdl: GAR131-RIPE
  • created: 2010-06-28T06:38:53Z
  • last-modified: 2021-08-06T12:21:52Z
  • route: 130.193.120.0/21
  • descr: GNC Assignment
  • origin: AS49800
  • mnt-by: MNT-GNC
  • created: 2011-10-28T06:34:56Z
  • last-modified: 2011-10-28T06:34:56Z

Links to attack logs

dotoronto-ssh-bruteforce-ip-list-2023-04-21