175.139.244.24 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 175.139.244.24 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 35/100

Host and Network Information

  • Mitre ATT&CK IDs: T1110 - Brute Force
  • Tags: brute force, Bruteforce, Brute-Force, ssh, SSH

  • View other sources: Spamhaus VirusTotal

  • Country: Malaysia
  • Network: AS4788 tm net internet service provider
  • Noticed: 1 times
  • Protcols Attacked: ssh
  • Countries Attacked: Australia

Open Ports Detected

5000 80 8083 81

CVEs Detected

CVE-2017-12075 CVE-2017-12076 CVE-2017-15889 CVE-2017-15894 CVE-2017-16774 CVE-2017-5753 CVE-2017-9553 CVE-2017-9554 CVE-2018-1160 CVE-2018-13280 CVE-2018-13284 CVE-2018-13286 CVE-2018-13291 CVE-2018-13293 CVE-2018-7170 CVE-2018-7185 CVE-2018-8916 CVE-2018-8917 CVE-2018-8919 CVE-2018-8920 CVE-2021-26560 CVE-2021-26561 CVE-2021-26562 CVE-2021-26563 CVE-2021-26564 CVE-2021-26565 CVE-2021-26566 CVE-2021-26567 CVE-2021-26569 CVE-2021-27646 CVE-2021-27647 CVE-2021-29083 CVE-2021-29088 CVE-2022-22684 CVE-2022-27622 CVE-2022-27623 CVE-2022-27624 CVE-2022-27625 CVE-2022-27626 CVE-2022-3576

Map

Whois Information

  • inetnum: 175.139.0.0 - 175.139.255.255
  • netname: ADSL-STREAMYX
  • descr: TMNST
  • country: MY
  • admin-c: EAK2-AP
  • tech-c: EAK2-AP
  • abuse-c: AM2355-AP
  • status: ALLOCATED NON-PORTABLE
  • notify: [email protected]
  • mnt-by: MAINT-MY-WEBE
  • mnt-lower: MAINT-MY-WEBE
  • mnt-routes: MAINT-MY-WEBE
  • mnt-irt: IRT-MY-WEBE
  • last-modified: 2023-08-17T04:29:23Z
  • irt: IRT-MY-WEBE
  • address: Menara TM, Jalan Pantai Baharu,
  • address: 59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
  • address: Malaysia
  • phone: +601110001000
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: ICO1-AP
  • tech-c: ICO1-AP
  • mnt-by: MAINT-MY-WEBE
  • last-modified: 2023-10-04T02:51:59Z
  • role: ABUSE MYWEBE
  • address: Menara TM, Jalan Pantai Baharu,
  • address: 59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
  • address: Malaysia
  • country: ZZ
  • phone: +601110001000
  • e-mail: [email protected]
  • admin-c: ICO1-AP
  • tech-c: ICO1-AP
  • nic-hdl: AM2355-AP
  • abuse-mailbox: [email protected]
  • mnt-by: APNIC-ABUSE
  • last-modified: 2023-10-04T02:52:46Z
  • person: EMRAN AHMED KAMAL
  • nic-hdl: EAK2-AP
  • e-mail: [email protected]
  • address: Telekom Malaysia
  • address: Jalan Pantai Baru, Kuala Lumpur.
  • phone: +6-03-83185434
  • fax-no: +6-03-22402126
  • country: MY
  • mnt-by: TM-NET-AP
  • abuse-mailbox: [email protected]
  • last-modified: 2014-02-11T04:58:41Z
  • route: 175.139.240.0/21
  • origin: AS4788
  • descr: Telekom Malaysia Berhad
  • mnt-by: MAINT-MY-WEBE
  • last-modified: 2023-08-17T04:24:04Z

Links to attack logs

digitaloceantoronto-ssh-bruteforce-ip-list-2023-10-10