172.245.210.170 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Potentially Malicious Host 🟡 39/100

Host and Network Information

  • Tags: Nextray, awsbah, cyber security, ioc, malicious, ntp, phishing, scanners
  • View other sources: Spamhaus VirusTotal

  • Country: United States of America
  • Network: AS36352 colocrossing
  • Noticed: 2 times
  • Protcols Attacked: ntp
  • Countries Attacked: Bahrain, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: qpur.xyz wsek.top addisababastockexchange.com jiechiwoshishabi11l.top zhaofw18.top zhouha.top nsnv.top 5050669.top luoxizhuanzhuan2.top wyku.top healthygro.cn xzfj.com.cn zhaofw29.top zhaofw03.top hxs195.top rdmu.top svhr.top nepc.top eftp.top whxugfd.cn on312.cn va571.cn wd981.cn uqxp.top 7092.top 1478.top cqwscj.top ul894.cn muxe.top butf.top d6ym.top tbke.top byvw.top uv287.cn uxqy.top pk126-3.top 9645.top 8260.top 2502.top 4600.top 8063.top 5870.top 9260.top 6206.top 6203.top qd392.cn rf945.cn rp248.cn rp843.cn uhkn.top jiechiwoshishabi33l.top 5yj.com.cn wkil.cn ym413.cn vy462.cn wf284.cn wq574.cn wu423.cn qo672.cn rc549.cn rf542.cn rt148.cn ru841.cn rw431.cn cqgsy.cn casinopay.xyz xo795.cn buyzeni.cn uf643.cn buyszeni.cn daoten.cn uq562.cn uy173.cn vf691.cn vg463.cn vi734.cn vw384.cn crpxw.cn vx564.cn fancel.cn cuannon.cn daliantuiguang.cn zhuangyinlu.cn qizanggou.cn peiyouwang.cn liuyuansheng.cn wu741.cn pe617.cn qa843.cn fuzhouxinwei.cn qb259.cn qs184.cn qw394.cn rx519.cn rc427.cn rz934.cn kw271.cn sb374.cn sk471.cn rh342.cn rl632.cn sp298.cn sp543.cn st497.cn kv287.cn lc852.cn lc452.cn tp481.cn le913.cn tr478.cn tw357.cn tw743.cn lh743.cn ls951.cn ls948.cn md718.cn mx192.cn nx467.cn nz682.cn od843.cn gf714.cn gi946.cn ha892.cn qpbv.top vduy.top sumv.top kvxy.top gukg.top eadc.top kjeg.top edkg.top zyr123.cn lejia99.cn gulis.cn xq453.cn ug581.cn uo439.cn uo567.cn up421.cn rv481.cn liisssq.icu ouous.icu yusys.icu wqqjj.icu ysyshjhs.icu yyshbs.icu sjsjsu.icu loisks.icu

Open Ports Detected

22

CVEs Detected

CVE-2016-20012 CVE-2017-15906 CVE-2018-15473 CVE-2018-15919 CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-14145 CVE-2020-15778 CVE-2021-36368 CVE-2021-41617

Map

Whois Information

  • NetRange: 172.245.0.0 - 172.245.255.255
  • CIDR: 172.245.0.0/16
  • NetName: CC-14
  • NetHandle: NET-172-245-0-0-1
  • Parent: NET172 (NET-172-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS36352
  • Organization: ColoCrossing (VGS-9)
  • RegDate: 2013-04-22
  • Updated: 2013-04-22
  • Ref: https://rdap.arin.net/registry/ip/172.245.0.0
  • OrgName: ColoCrossing
  • OrgId: VGS-9
  • Address: 325 Delaware Avenue
  • Address: Suite 300
  • City: Buffalo
  • StateProv: NY
  • PostalCode: 14202
  • Country: US
  • RegDate: 2005-06-20
  • Updated: 2019-10-17
  • Ref: https://rdap.arin.net/registry/entity/VGS-9
  • OrgAbuseHandle: ABUSE3246-ARIN
  • OrgAbuseName: Abuse
  • OrgAbusePhone: +1-800-518-9716
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3246-ARIN
  • OrgNOCHandle: NETWO882-ARIN
  • OrgNOCName: Network Operations
  • OrgNOCPhone: +1-800-518-9716
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO882-ARIN
  • OrgTechHandle: NETWO882-ARIN
  • OrgTechName: Network Operations
  • OrgTechPhone: +1-800-518-9716
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/NETWO882-ARIN

Links to attack logs

awsbah-ntp-bruteforce-ip-list-2021-11-10 **