147.139.28.254 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 147.139.28.254 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 45/100

Host and Network Information

  • Mitre ATT&CK IDs: T1014 - Rootkit, T1027 - Obfuscated Files or Information, T1027.002 - Software Packing, T1037 - Boot or Logon Initialization Scripts, T1037.004 - RC Scripts, T1056 - Input Capture, T1057 - Process Discovery, T1059 - Command and Scripting Interpreter, T1059.004 - Unix Shell, T1070 - Indicator Removal on Host, T1070.004 - File Deletion, T1071 - Application Layer Protocol, T1071.001 - Web Protocols, T1078 - Valid Accounts, T1082 - System Information Discovery, T1083 - File and Directory Discovery, T1090 - Proxy, T1095 - Non-Application Layer Protocol, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110 - Brute Force, T1110.004 - Credential Stuffing, T1132 - Data Encoding, T1132.002 - Non-Standard Encoding, T1497 - Virtualization/Sandbox Evasion, T1497.003 - Time Based Evasion, T1546 - Event Triggered Execution, T1562 - Impair Defenses, T1562.003 - Impair Command History Logging, T1564 - Hide Artifacts, T1564.001 - Hidden Files and Directories, T1571 - Non-Standard Port, T1572 - Protocol Tunneling, T1573 - Encrypted Channel, T1573.001 - Symmetric Cryptography, T1583 - Acquire Infrastructure, T1583.001 - Domains, T1587 - Develop Capabilities, T1587.001 - Malware, T1588 - Obtain Capabilities, T1588.001 - Malware, T1588.002 - Tool, T1592 - Gather Victim Host Information, T1592.002 - Software, T1599 - Network Boundary Bridging, T1599.001 - Network Address Translation Traversal, T1608 - Stage Capabilities, T1608.001 - Upload Malware, T1608.002 - Upload Tool
  • Tags: Brute-Force, Bruteforce, Linux, Mélofée, Nextray, Rootkit, SSH, Scanner, Webattack, Winnti, adversary, alien, alienreverse, alienreverse c, amoeba, april, apt41, bruteforce, c ip, c server, cobalt strike, cobaltstrike, cobaltstrike c, cowrie, cyber security, digital ocean, earthworm, elf x32, elf x64, go downloader, hellobot, hellobot c, implant, implant version, installation, installer, ioc, kill, malicious, mlofe, mlofe c, mélofée, overwrite, p tcp, pe x64, phishing, plugx, plugx c, scanners, scanning, smtp, ssh, stowaway, tcp, text file, winnti, winnti c, winnti linux

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: haley_ssh

  • Country: India
  • Network: AS45102 alibaba (us) technology co. ltd.
  • Noticed: 1 times
  • Protcols Attacked: ssh
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Open Ports Detected

22

Map

Whois Information

  • NetRange: 147.139.0.0 - 147.139.255.255
  • CIDR: 147.139.0.0/16
  • NetName: AL-3
  • NetHandle: NET-147-139-0-0-1
  • Parent: NET147 (NET-147-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS:
  • Organization: Alibaba Cloud LLC (AL-3)
  • RegDate: 2016-12-19
  • Updated: 2017-04-26
  • Ref: https://rdap.arin.net/registry/ip/147.139.0.0
  • OrgName: Alibaba Cloud LLC
  • OrgId: AL-3
  • Address: 400 S El Camino Real, Suite 400
  • City: San Mateo
  • StateProv: CA
  • PostalCode: 94402
  • Country: US
  • RegDate: 2010-10-29
  • Updated: 2023-05-09
  • Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
  • Comment:
  • Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
  • Comment:
  • Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: [email protected] and [email protected]
  • Comment:
  • Comment: 4. For network issue, please send email to this mail list: [email protected]
  • Ref: https://rdap.arin.net/registry/entity/AL-3
  • OrgAbuseHandle: NETWO4028-ARIN
  • OrgAbuseName: Network Abuse
  • OrgAbusePhone: +1-408-785-5580
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO4028-ARIN
  • OrgNOCHandle: ALIBA-ARIN
  • OrgNOCName: Alibaba NOC
  • OrgNOCPhone: +1-408-748-1200
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/ALIBA-ARIN
  • OrgTechHandle: ALIBA-ARIN
  • OrgTechName: Alibaba NOC
  • OrgTechPhone: +1-408-748-1200
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/ALIBA-ARIN
  • NetRange: 147.139.0.0 - 147.139.127.255
  • CIDR: 147.139.0.0/17
  • NetName: ALICLOUD-IN
  • NetHandle: NET-147-139-0-0-2
  • Parent: AL-3 (NET-147-139-0-0-1)
  • NetType: Reassigned
  • OriginAS: AS45102
  • Customer: ALICLOUD-IN (C07275014)
  • RegDate: 2019-01-10
  • Updated: 2019-01-10
  • Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
  • Comment:
  • Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
  • Comment:
  • Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: [email protected] and [email protected]
  • Comment:
  • Comment: 4. For network issue, please send email to this mail list: [email protected]
  • Ref: https://rdap.arin.net/registry/ip/147.139.0.0
  • CustName: ALICLOUD-IN
  • Address: 101A Platina Building, Plot No. C-59, Bandra Kurla Complex, Bandra East, Mumbai
  • City: Mumbai
  • StateProv:
  • PostalCode:
  • Country: IN
  • RegDate: 2019-01-10
  • Updated: 2019-01-10
  • Ref: https://rdap.arin.net/registry/entity/C07275014
  • OrgAbuseHandle: NETWO4028-ARIN
  • OrgAbuseName: Network Abuse
  • OrgAbusePhone: +1-408-785-5580
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO4028-ARIN
  • OrgNOCHandle: ALIBA-ARIN
  • OrgNOCName: Alibaba NOC
  • OrgNOCPhone: +1-408-748-1200
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/ALIBA-ARIN
  • OrgTechHandle: ALIBA-ARIN
  • OrgTechName: Alibaba NOC
  • OrgTechPhone: +1-408-748-1200
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/ALIBA-ARIN

Links to attack logs

bruteforce-ip-list-2022-05-14 dotoronto-ssh-bruteforce-ip-list-2022-06-27 bruteforce-ip-list-2022-06-18 bruteforce-ip-list-2022-05-29