172.245.210.170 Threat Intelligence and Host Information
Share on:
Apr 24, 2023
ipinfopage
General
This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.
Potentially Malicious Host 🟡 39/100
Host and Network Information
- Tags: Nextray, awsbah, cyber security, ioc, malicious, ntp, phishing, scanners
-
View other sources: Spamhaus VirusTotal
- Country: United States of America
- Network: AS36352 colocrossing
- Noticed: 2 times
- Protcols Attacked: ntp
- Countries Attacked: Bahrain, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
- Passive DNS Results: qpur.xyz wsek.top addisababastockexchange.com jiechiwoshishabi11l.top zhaofw18.top zhouha.top nsnv.top 5050669.top luoxizhuanzhuan2.top wyku.top healthygro.cn xzfj.com.cn zhaofw29.top zhaofw03.top hxs195.top rdmu.top svhr.top nepc.top eftp.top whxugfd.cn on312.cn va571.cn wd981.cn uqxp.top 7092.top 1478.top cqwscj.top ul894.cn muxe.top butf.top d6ym.top tbke.top byvw.top uv287.cn uxqy.top pk126-3.top 9645.top 8260.top 2502.top 4600.top 8063.top 5870.top 9260.top 6206.top 6203.top qd392.cn rf945.cn rp248.cn rp843.cn uhkn.top jiechiwoshishabi33l.top 5yj.com.cn wkil.cn ym413.cn vy462.cn wf284.cn wq574.cn wu423.cn qo672.cn rc549.cn rf542.cn rt148.cn ru841.cn rw431.cn cqgsy.cn casinopay.xyz xo795.cn buyzeni.cn uf643.cn buyszeni.cn daoten.cn uq562.cn uy173.cn vf691.cn vg463.cn vi734.cn vw384.cn crpxw.cn vx564.cn fancel.cn cuannon.cn daliantuiguang.cn zhuangyinlu.cn qizanggou.cn peiyouwang.cn liuyuansheng.cn wu741.cn pe617.cn qa843.cn fuzhouxinwei.cn qb259.cn qs184.cn qw394.cn rx519.cn rc427.cn rz934.cn kw271.cn sb374.cn sk471.cn rh342.cn rl632.cn sp298.cn sp543.cn st497.cn kv287.cn lc852.cn lc452.cn tp481.cn le913.cn tr478.cn tw357.cn tw743.cn lh743.cn ls951.cn ls948.cn md718.cn mx192.cn nx467.cn nz682.cn od843.cn gf714.cn gi946.cn ha892.cn qpbv.top vduy.top sumv.top kvxy.top gukg.top eadc.top kjeg.top edkg.top zyr123.cn lejia99.cn gulis.cn xq453.cn ug581.cn uo439.cn uo567.cn up421.cn rv481.cn liisssq.icu ouous.icu yusys.icu wqqjj.icu ysyshjhs.icu yyshbs.icu sjsjsu.icu loisks.icu
Open Ports Detected
CVEs Detected
CVE-2016-20012 CVE-2017-15906 CVE-2018-15473 CVE-2018-15919 CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-14145 CVE-2020-15778 CVE-2021-36368 CVE-2021-41617
Map
Whois Information
- NetRange: 172.245.0.0 - 172.245.255.255
- CIDR: 172.245.0.0/16
- NetName: CC-14
- NetHandle: NET-172-245-0-0-1
- Parent: NET172 (NET-172-0-0-0-0)
- NetType: Direct Allocation
- OriginAS: AS36352
- Organization: ColoCrossing (VGS-9)
- RegDate: 2013-04-22
- Updated: 2013-04-22
- Ref: https://rdap.arin.net/registry/ip/172.245.0.0
- OrgName: ColoCrossing
- OrgId: VGS-9
- Address: 325 Delaware Avenue
- Address: Suite 300
- City: Buffalo
- StateProv: NY
- PostalCode: 14202
- Country: US
- RegDate: 2005-06-20
- Updated: 2019-10-17
- Ref: https://rdap.arin.net/registry/entity/VGS-9
- OrgAbuseHandle: ABUSE3246-ARIN
- OrgAbuseName: Abuse
- OrgAbusePhone: +1-800-518-9716
- OrgAbuseEmail: [email protected]
- OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3246-ARIN
- OrgNOCHandle: NETWO882-ARIN
- OrgNOCName: Network Operations
- OrgNOCPhone: +1-800-518-9716
- OrgNOCEmail: [email protected]
- OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO882-ARIN
- OrgTechHandle: NETWO882-ARIN
- OrgTechName: Network Operations
- OrgTechPhone: +1-800-518-9716
- OrgTechEmail: [email protected]
- OrgTechRef: https://rdap.arin.net/registry/entity/NETWO882-ARIN