166.62.121.196 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 166.62.121.196 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 15/100

Host and Network Information

  • JARM: 07d14d16d21d21d07c42d43d0000009424803a662b126a748cf4f90707a33c

  • View other sources: Spamhaus VirusTotal

  • Country: United States
  • Network: AS26496 godaddy.com llc
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy
  • Passive DNS Results: mail.baycitiesonline.com www.prestigeautobodyandtowing.com www.familyrecreationday.com baycitiesjournal.com new.familyrecreationday.com myfarmgarden.com www.myfarmgarden.com prestigeautobodyandtowing.com andersonjewelers.diamonds armadamedia.com andersonsculligan.com familyrecreationday.com baycitiesonline.com

Open Ports Detected

110 143 2077 2082 2083 2086 2087 21 25 3306 443 465 53 587 80 993 995

CVEs Detected

CVE-2015-9253 CVE-2017-7272 CVE-2017-7963 CVE-2018-19296 CVE-2018-19395 CVE-2018-19396 CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 CVE-2019-16220 CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 CVE-2019-16780 CVE-2019-16781 CVE-2019-17669 CVE-2019-17670 CVE-2019-17671 CVE-2019-17672 CVE-2019-17673 CVE-2019-17674 CVE-2019-17675 CVE-2019-20041 CVE-2019-20042 CVE-2019-20043 CVE-2019-9637 CVE-2019-9638 CVE-2019-9639 CVE-2019-9641 CVE-2020-11025 CVE-2020-11026 CVE-2020-11027 CVE-2020-11028 CVE-2020-11029 CVE-2020-11030 CVE-2020-12783 CVE-2020-25286 CVE-2020-28007 CVE-2020-28008 CVE-2020-28009 CVE-2020-28010 CVE-2020-28011 CVE-2020-28012 CVE-2020-28013 CVE-2020-28014 CVE-2020-28015 CVE-2020-28016 CVE-2020-28017 CVE-2020-28018 CVE-2020-28019 CVE-2020-28021 CVE-2020-28022 CVE-2020-28023 CVE-2020-28024 CVE-2020-28025 CVE-2020-28026 CVE-2020-28032 CVE-2020-28033 CVE-2020-28034 CVE-2020-28035 CVE-2020-28036 CVE-2020-28037 CVE-2020-28038 CVE-2020-28039 CVE-2020-28040 CVE-2020-36326 CVE-2020-4046 CVE-2020-4047 CVE-2020-4048 CVE-2020-4049 CVE-2020-4050 CVE-2020-8015 CVE-2021-27216 CVE-2021-29450 CVE-2021-39201 CVE-2021-44223 CVE-2022-21661 CVE-2022-21662 CVE-2022-21663 CVE-2022-21664 CVE-2022-31628 CVE-2022-31629 CVE-2022-3590 CVE-2022-37451 CVE-2022-37452 CVE-2022-43497 CVE-2022-43500 CVE-2022-43504 CVE-2023-22622 CVE-2023-2745

Map

Whois Information

  • NetRange: 166.62.0.0 - 166.62.127.255
  • CIDR: 166.62.0.0/17
  • NetName: GO-DADDY-COM-LLC
  • NetHandle: NET-166-62-0-0-1
  • Parent: NET166 (NET-166-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS26496
  • Organization: GoDaddy.com, LLC (GODAD)
  • RegDate: 2012-11-14
  • Updated: 2014-02-25
  • Comment: Please send abuse complaints to [email protected]
  • Ref: https://rdap.arin.net/registry/ip/166.62.0.0
  • OrgName: GoDaddy.com, LLC
  • OrgId: GODAD
  • Address: 2155 E GoDaddy Way
  • City: Tempe
  • StateProv: AZ
  • PostalCode: 85284
  • Country: US
  • RegDate: 2007-06-01
  • Updated: 2022-08-02
  • Comment: Please send abuse complaints to [email protected]
  • Ref: https://rdap.arin.net/registry/entity/GODAD
  • OrgNOCHandle: NOC124-ARIN
  • OrgNOCName: Network Operations Center
  • OrgNOCPhone: +1-480-505-8809
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/NOC124-ARIN
  • OrgTechHandle: NOC124-ARIN
  • OrgTechName: Network Operations Center
  • OrgTechPhone: +1-480-505-8809
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/NOC124-ARIN
  • OrgAbuseHandle: ABUSE51-ARIN
  • OrgAbuseName: Abuse Department
  • OrgAbusePhone: +1-480-624-2505
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE51-ARIN
  • RNOCHandle: NOC124-ARIN
  • RNOCName: Network Operations Center
  • RNOCPhone: +1-480-505-8809
  • RNOCEmail: [email protected]
  • RNOCRef: https://rdap.arin.net/registry/entity/NOC124-ARIN
  • RAbuseHandle: ABUSE51-ARIN
  • RAbuseName: Abuse Department
  • RAbusePhone: +1-480-624-2505
  • RAbuseEmail: [email protected]
  • RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE51-ARIN
  • RTechHandle: NOC124-ARIN
  • RTechName: Network Operations Center
  • RTechPhone: +1-480-505-8809
  • RTechEmail: [email protected]
  • RTechRef: https://rdap.arin.net/registry/entity/NOC124-ARIN

Links to attack logs

anonymous-proxy-ip-list-2023-10-31 anonymous-proxy-ip-list-2023-11-04 anonymous-proxy-ip-list-2023-11-02 anonymous-proxy-ip-list-2023-10-21 anonymous-proxy-ip-list-2023-10-27 anonymous-proxy-ip-list-2023-11-01 anonymous-proxy-ip-list-2023-11-03