159.65.132.40 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 159.65.132.40 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 50/100

Host and Network Information

  • Tags: aws, cyber security, ioc, malicious, Nextray, phishing, Scanner, scanners, scanning, smtp, ssh, tcp, Webattack

  • View other sources: Spamhaus VirusTotal

  • Country: Singapore
  • Network: AS14061 digitalocean llc
  • Noticed: 32 times
  • Protocols Attacked: ssh
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Singapore, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: www.donation.baannokkamin.org donation.baannokkamin.org jokerslot.casino buildwithinnovation.com www.buildwithinnovation.com

Malware Detected on Host

Count: 4 4beca1bb98b78524f2c390b8ea07d07fd9817673d055a3830aea25b756ffe23e 1b6353376b7cf7d9a1091c54cd191171d0106587daa261ecece410410dc27a92 354389a28738440441578356681616ad1674a6c055b99ae3fb043e8a966169aa 041b21ec0005a72ad31b4e3fd85b4e5137ecab3e8387c2ba54796fbc10b51a3c

Open Ports Detected

22

CVEs Detected

CVE-2007-2768 CVE-2008-3844 CVE-2023-28531 CVE-2023-38408 CVE-2023-48795 CVE-2023-51384 CVE-2023-51385 CVE-2023-51767

Map

Whois Information

  • NetRange: 159.65.0.0 - 159.65.255.255
  • CIDR: 159.65.0.0/16
  • NetName: DIGITALOCEAN-159-65-0-0
  • NetHandle: NET-159-65-0-0-1
  • Parent: NET159 (NET-159-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS14061
  • Organization: DigitalOcean, LLC (DO-13)
  • RegDate: 2017-10-24
  • Updated: 2020-04-03
  • Comment: Routing and Peering Policy can be found at https://www.as14061.net
  • Comment:
  • Ref: https://rdap.arin.net/registry/ip/159.65.0.0
  • OrgName: DigitalOcean, LLC
  • OrgId: DO-13
  • Address: 101 Ave of the Americas
  • Address: FL2
  • City: New York
  • StateProv: NY
  • PostalCode: 10013
  • Country: US
  • RegDate: 2012-05-14
  • Updated: 2023-10-23
  • Ref: https://rdap.arin.net/registry/entity/DO-13
  • OrgTechHandle: NOC32014-ARIN
  • OrgTechName: Network Operations Center
  • OrgTechPhone: +1-347-875-6044
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
  • OrgNOCHandle: NOC32014-ARIN
  • OrgNOCName: Network Operations Center
  • OrgNOCPhone: +1-347-875-6044
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
  • OrgAbuseHandle: ABUSE5232-ARIN
  • OrgAbuseName: Abuse, DigitalOcean
  • OrgAbusePhone: +1-347-875-6044
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5232-ARIN

Links to attack logs

** dosing-ssh-bruteforce-ip-list-2022-06-24 ** **