157.245.145.123 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Host and Network Information

  • View other sources: Spamhaus VirusTotal

  • Country: Singapore
  • Network: AS14061 digitalocean llc
  • Noticed: 1 times
  • Protcols Attacked: telnet
  • Passive DNS Results: prepartorymailyu.online sleepy-hertz.157-245-145-123.plesk.page sqres.id

Open Ports Detected

1022 111 1433 21 22 3306 5000 6379 80 8080 9000 9001 9004 9006

CVEs Detected

CVE-2014-0128 CVE-2014-3609 CVE-2014-6270 CVE-2014-7141 CVE-2014-7142 CVE-2015-3455 CVE-2015-5400 CVE-2016-10002 CVE-2016-20012 CVE-2016-2390 CVE-2016-2569 CVE-2016-2570 CVE-2016-2571 CVE-2016-3947 CVE-2016-3948 CVE-2016-4051 CVE-2016-4052 CVE-2016-4053 CVE-2016-4054 CVE-2016-4553 CVE-2016-4554 CVE-2016-4555 CVE-2016-4556 CVE-2017-15906 CVE-2017-3735 CVE-2017-3736 CVE-2017-3737 CVE-2017-3738 CVE-2018-0732 CVE-2018-0734 CVE-2018-0737 CVE-2018-0739 CVE-2018-15473 CVE-2018-15919 CVE-2018-19131 CVE-2018-19132 CVE-2018-20685 CVE-2018-5407 CVE-2019-12519 CVE-2019-12520 CVE-2019-12521 CVE-2019-12522 CVE-2019-12523 CVE-2019-12524 CVE-2019-12526 CVE-2019-12528 CVE-2019-12529 CVE-2019-13345 CVE-2019-1547 CVE-2019-1551 CVE-2019-1552 CVE-2019-1559 CVE-2019-1563 CVE-2019-18676 CVE-2019-18677 CVE-2019-18678 CVE-2019-18679 CVE-2019-18860 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-11945 CVE-2020-14058 CVE-2020-14145 CVE-2020-15049 CVE-2020-15778 CVE-2020-15810 CVE-2020-15811 CVE-2020-1968 CVE-2020-1971 CVE-2020-24606 CVE-2020-25097 CVE-2020-8449 CVE-2020-8450 CVE-2020-8517 CVE-2021-23840 CVE-2021-23841 CVE-2021-28116 CVE-2021-28651 CVE-2021-28652 CVE-2021-31806 CVE-2021-31807 CVE-2021-31808 CVE-2021-33620 CVE-2021-36368 CVE-2021-3712 CVE-2021-4160 CVE-2021-41617 CVE-2021-46784 CVE-2022-0778 CVE-2022-1292 CVE-2022-2068 CVE-2022-41318 CVE-2022-4304 CVE-2023-0215 CVE-2023-0286

Map

Whois Information

  • NetRange: 157.245.0.0 - 157.245.255.255
  • CIDR: 157.245.0.0/16
  • NetName: DIGITALOCEAN-157-245-0-0
  • NetHandle: NET-157-245-0-0-1
  • Parent: NET157 (NET-157-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS14061
  • Organization: DigitalOcean, LLC (DO-13)
  • RegDate: 2019-05-09
  • Updated: 2020-04-03
  • Comment: Routing and Peering Policy can be found at https://www.as14061.net
  • Comment:
  • Ref: https://rdap.arin.net/registry/ip/157.245.0.0
  • OrgName: DigitalOcean, LLC
  • OrgId: DO-13
  • Address: 101 Ave of the Americas
  • Address: FL2
  • City: New York
  • StateProv: NY
  • PostalCode: 10013
  • Country: US
  • RegDate: 2012-05-14
  • Updated: 2022-05-19
  • Ref: https://rdap.arin.net/registry/entity/DO-13
  • OrgAbuseHandle: ABUSE5232-ARIN
  • OrgAbuseName: Abuse, DigitalOcean
  • OrgAbusePhone: +1-347-875-6044
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5232-ARIN
  • OrgTechHandle: NOC32014-ARIN
  • OrgTechName: Network Operations Center
  • OrgTechPhone: +1-347-875-6044
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
  • OrgNOCHandle: NOC32014-ARIN
  • OrgNOCName: Network Operations Center
  • OrgNOCPhone: +1-347-875-6044
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN

Links to attack logs

dofrank-telnet-bruteforce-ip-list-2023-03-07