134.122.133.134 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 134.122.133.134 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 45/100

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110 - Brute Force, T1110.004 - Credential Stuffing, T1560 - Archive Collected Data, T1566 - Phishing, T1573 - Encrypted Channel
  • Tags: Brute-Force, Bruteforce, Nextray, SSH, aws, c2 ips, configuration, cowrie, cyber security, figure, ioc, iso file, lnk file, malicious, muhcu, new key, phishing, qakbot, rc4 decryption, reported count, result, scanners, sha1 hash, ssh, vultr

  • View other sources: Spamhaus VirusTotal

  • Country: Singapore
  • Network: AS64050 bgpnet global asn
  • Noticed: 1 times
  • Protcols Attacked: ssh
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Singapore, Spain, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: syop.080976.com res.tpqhoft.cn lixinshangmao.com vkvvukm.top xzkhwcp.top yylligug666.vip zwzlbfp.top qahfkko.top hywczwu.top hdvxbac.top yoqbbsb.top qvgwyom.top qchedtl.top osxrkzp.top uumphvh.top cdn.ourfashionshop.com cjsdhbzkusn.com ilyxy0.com zkzzuc.com w.gec.cash ccb79.com ccb79.xyz ys35.cc 56388.xyz ys569.cc mmbcxg.xyz pqwers.xyz www.laoyinwopy.com laoyinwopy.com cdda244617.cn www.cdda244617.cn zfc.appissued.com qd2.appissued.com hxdc66.com licai.hxdc66.com jmzy.safeusg.com ziyuan1.safeusg.com licai.hbxycy.cn cshb.vip cshb88.cn www.cshb88.cn cs588.cc qmcp.appissued.com appissued.com www.appissued.com k8wz.cc www.k8wz.cc erwm.wzjiaoyu.cn comemocos.com www.comemocos.com app.gaincapitalmarkets.in easilymoney.in wzjiaoyu.cn www.wzjiaoyu.cn avcc.top www.avcc.top wzjkzx.cn www.wzjkzx.cn www.xiaoqiwangzhuan.cn xiaoqiwangzhuan.cn www.hnskjc.cn hnskjc.cn pc.aipayun.cn zy97.top www.zy97.top www.xacgnykj.top xacgnykj.top lectv.vip www.lectv.vip app.aipayun.cn app.k8ccp.top app.k8ccp.com k8ccp.top www.k8ccp.top k8ccp.com www.k8ccp.com www.k8cc.top k8cc.top dcarloan.com m.aipayun.cn jsjyjd.com www.jsjyjd.com www.aipayun.cn aipayun.cn www.avfei.cn avfei.cn avht.top www.avht.top

Open Ports Detected

21 80 888

Map

Whois Information

  • NetRange: 134.122.128.0 - 134.122.255.255
  • CIDR: 134.122.128.0/17
  • NetName: APNIC
  • NetHandle: NET-134-122-128-0-1
  • Parent: NET134 (NET-134-0-0-0-0)
  • NetType: Early Registrations, Transferred to APNIC
  • OriginAS:
  • Organization: Asia Pacific Network Information Centre (APNIC)
  • RegDate: 2019-11-11
  • Updated: 2019-11-11
  • Ref: https://rdap.arin.net/registry/ip/134.122.128.0
  • OrgName: Asia Pacific Network Information Centre
  • OrgId: APNIC
  • Address: PO Box 3646
  • City: South Brisbane
  • StateProv: QLD
  • PostalCode: 4101
  • Country: AU
  • RegDate:
  • Updated: 2012-01-24
  • Ref: https://rdap.arin.net/registry/entity/APNIC
  • OrgTechHandle: AWC12-ARIN
  • OrgTechName: APNIC Whois Contact
  • OrgTechPhone: +61 7 3858 3188
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • OrgAbuseHandle: AWC12-ARIN
  • OrgAbuseName: APNIC Whois Contact
  • OrgAbusePhone: +61 7 3858 3188
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
  • inetnum: 134.122.128.0 - 134.122.143.255
  • netname: CTG122-128-JP
  • descr: CTG Server Ltd.
  • country: JP
  • admin-c: BCPL4-AP
  • tech-c: BCPL4-AP
  • abuse-c: AC2487-AP
  • status: ALLOCATED NON-PORTABLE
  • mnt-by: MAINT-RCPL-SG
  • mnt-irt: IRT-CTG-HK
  • last-modified: 2022-03-30T17:10:00Z
  • irt: IRT-CTG-HK
  • address: 202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: RCPL3-AP
  • tech-c: RCPL3-AP
  • mnt-by: MAINT-RCPL-SG
  • last-modified: 2023-05-19T03:06:20Z
  • role: ABUSE CTGHK
  • address: 202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
  • country: ZZ
  • phone: +000000000
  • e-mail: [email protected]
  • admin-c: RCPL3-AP
  • tech-c: RCPL3-AP
  • nic-hdl: AC2487-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2023-05-19T03:07:10Z
  • role: BGP CONSULTANCY PTE LTD administrator
  • address: 399 Chai Wan Road, Chai Wan, Hong Kong
  • country: HK
  • phone: +603-7806-1316
  • e-mail: [email protected]
  • admin-c: RCPL3-AP
  • tech-c: RCPL3-AP
  • nic-hdl: BCPL4-AP
  • mnt-by: MAINT-RCPL-SG
  • last-modified: 2017-03-14T09:18:17Z
  • route: 134.122.133.0/24
  • origin: AS64050
  • descr: RACKIP CONSULTANCY PTE. LTD.
  • mnt-by: MAINT-RCPL-SG
  • last-modified: 2020-05-20T05:22:27Z

Links to attack logs

vultrmadrid-ssh-bruteforce-ip-list-2022-09-30 vultrmadrid-ssh-bruteforce-ip-list-2022-10-02 dosing-ssh-bruteforce-ip-list-2022-09-30