144.172.73.38 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 144.172.73.38 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 30/100

Host and Network Information

  • Tags: Nextray, SSH, cyber security, ioc, malicious, phishing

  • View other sources: Spamhaus VirusTotal

  • Country: United States
  • Network: AS49581 bil-tim bilgisayar hizmetleri
  • Noticed: 1 times
  • Protcols Attacked: SSH
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Malware Detected on Host

Count: 8 c3e82b006b36cc4654c5924ca2fde4405c61e3bddbb928d9ada80be2ea5f602a fff0c085b9c8e3a8ef3fa9e7395213e91363116e7d80cabf1e781fb2ced57d30 ea1218ec89f360cc2e56f9a394af8e0b1d990c8e9d58ecaa4beb0ac7cc3ad691 0d4d42df5565458490aa99bb57283526b1add5ee9861908f00b99e815800f957 6a7232a5ebbc987bbbb6ad3e8685db787c1c279a5a68f1a458af8704bfeb824e f8e17ecac98fd3f195584c60f3d6d09eba82007531f24e4558833d584859f6f9 d7831c938f84af0dbe1cd5f6ceeafce059ff3c086a95f2c7a79b368476fe0e2f 010432edb2f0ca0ca35b369c65d1f81d74982bbc06637a6608447e0162a7cd65

Open Ports Detected

22 8080

Map

Whois Information

  • NetRange: 144.172.64.0 - 144.172.127.255
  • CIDR: 144.172.64.0/18
  • NetName: PONYNET-12
  • NetHandle: NET-144-172-64-0-1
  • Parent: NET144 (NET-144-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS53667
  • Organization: FranTech Solutions (SYNDI-5)
  • RegDate: 2014-05-07
  • Updated: 2014-05-07
  • Ref: https://rdap.arin.net/registry/ip/144.172.64.0
  • OrgName: FranTech Solutions
  • OrgId: SYNDI-5
  • Address: 1621 Central Ave
  • City: Cheyenne
  • StateProv: WY
  • PostalCode: 82001
  • Country: US
  • RegDate: 2010-07-21
  • Updated: 2017-01-28
  • Ref: https://rdap.arin.net/registry/entity/SYNDI-5
  • OrgTechHandle: FDI19-ARIN
  • OrgTechName: Dias, Francisco
  • OrgTechPhone: +1-778-977-8246
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/FDI19-ARIN
  • OrgAbuseHandle: FDI19-ARIN
  • OrgAbuseName: Dias, Francisco
  • OrgAbusePhone: +1-778-977-8246
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/FDI19-ARIN
  • NetRange: 144.172.73.0 - 144.172.73.255
  • CIDR: 144.172.73.0/24
  • NetName: 100UP-HOSTING
  • NetHandle: NET-144-172-73-0-1
  • Parent: PONYNET-12 (NET-144-172-64-0-1)
  • NetType: Reassigned
  • OriginAS: AS44592
  • Customer: 100UP Hosting (C08183130)
  • RegDate: 2022-02-02
  • Updated: 2022-02-02
  • Ref: https://rdap.arin.net/registry/ip/144.172.73.0
  • CustName: 100UP Hosting
  • Address: Bogener Str. 3 b
  • City: Parkstetten
  • StateProv: DE
  • PostalCode: 94365
  • Country: DE
  • RegDate: 2022-02-02
  • Updated: 2022-02-02
  • Ref: https://rdap.arin.net/registry/entity/C08183130
  • OrgTechHandle: FDI19-ARIN
  • OrgTechName: Dias, Francisco
  • OrgTechPhone: +1-778-977-8246
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/FDI19-ARIN
  • OrgAbuseHandle: FDI19-ARIN
  • OrgAbuseName: Dias, Francisco
  • OrgAbusePhone: +1-778-977-8246
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/FDI19-ARIN

Links to attack logs

bruteforce-ip-list-2020-06-18