161.35.19.129 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 161.35.19.129 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Likely Malicious Host 🟠 60/100

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110.004 - Credential Stuffing, T1110 - Brute Force
  • Tags: Bruteforce, Brute-Force, cowrie, cyber security, ioc, malicious, Nextray, phishing, ssh, SSH

  • View other sources: Spamhaus VirusTotal

  • Country: Germany
  • Network: AS14061 digitalocean llc
  • Noticed: 50 times
  • Protocols Attacked: ssh
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: vammon-dev-e86e98eb.mongo.ondigitalocean.com contato3.admgestor.com stef.3cx.gr www.samirhanigroup.com samirhanigroup.com atelier-12.com grandviewchahtoul.com costo.misco-furniture.com apicosto.misco-furniture.com

Malware Detected on Host

Count: 11 0020e188c36d8979a7ec8db44f478f06ba34151b329c645ee0295e4da96137bb 0c946b095469a7be23241476b4d069804e1643c6313e14914854f24b7dfd3600 3783d48d6d44d88d9bf4bbb9eaa9b4f10b258447d45b5d8c2e49c5132cdc9284 f226616dcab5868dd11313462d57834a7dd683641fc4f599f6cd0a6c3718266e 0ac10cb1898d5d75cafc730cec147129f9b64dd7e063ffa833b1c9ba93c50691 20c91a51721e21851a9378758513e3d0ec631985cab6f862b783627792f1f127 4f2d668a9f829aad2f91c6bca116c63f722f8df5925f994ce30ac6e2b2c5b4af 4f4c232ea2c69924fb6e25c1be805252f13fca60a413529e16b89d759c4bf0b5 cabe0605dd6140798ca1573bc18bbc38043b41d7e8bc202fb6ce104462a88595 12055ad316953428f253335e313855ab7200e9b3bf0a03d8fda95dca58b0bc94

Open Ports Detected

27017

Map

Whois Information

  • NetRange: 161.35.0.0 - 161.35.255.255
  • CIDR: 161.35.0.0/16
  • NetName: DIGITALOCEAN-161-35-0-0
  • NetHandle: NET-161-35-0-0-1
  • Parent: NET161 (NET-161-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS14061
  • Organization: DigitalOcean, LLC (DO-13)
  • RegDate: 2019-07-30
  • Updated: 2020-04-03
  • Comment: Routing and Peering Policy can be found at https://www.as14061.net
  • Comment:
  • Ref: https://rdap.arin.net/registry/ip/161.35.0.0
  • OrgName: DigitalOcean, LLC
  • OrgId: DO-13
  • Address: 101 Ave of the Americas
  • Address: FL2
  • City: New York
  • StateProv: NY
  • PostalCode: 10013
  • Country: US
  • RegDate: 2012-05-14
  • Updated: 2023-10-23
  • Ref: https://rdap.arin.net/registry/entity/DO-13
  • OrgTechHandle: NOC32014-ARIN
  • OrgTechName: Network Operations Center
  • OrgTechPhone: +1-347-875-6044
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
  • OrgNOCHandle: NOC32014-ARIN
  • OrgNOCName: Network Operations Center
  • OrgNOCPhone: +1-347-875-6044
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
  • OrgAbuseHandle: ABUSE5232-ARIN
  • OrgAbuseName: Abuse, DigitalOcean
  • OrgAbusePhone: +1-347-875-6044
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5232-ARIN

Links to attack logs

vultrmadrid-ssh-bruteforce-ip-list-2022-12-04 ** vultrparis-ssh-bruteforce-ip-list-2022-11-27 ** **