190.103.202.12 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Likely Malicious Host 🟠 65/100

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110 - Brute Force, T1110.004 - Credential Stuffing
  • Tags: Brute-Force, Bruteforce, Malicious IP, Nextray, SSH, Telnet, attack, aws, blacklist, bruteforce, cowrie, cyber security, digital ocean, ioc, login, malicious, phishing, scan, scanner, scanners, ssh, tcp, vultr
  • View other sources: Spamhaus VirusTotal

  • Country: Argentina
  • Network: AS27987 nodocoop federacin de cooperativas ltda.
  • Noticed: 50 times
  • Protcols Attacked: ssh
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Singapore, Spain, Turkey, Ukraine, United Kingdom, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: coopespartillar.com.ar

Malware Detected on Host

Count: 1 9c78170b060d219226face6ed8d2400905c6ae135f8d92bc4d544bd07561f9b7

Open Ports Detected

22 80

CVEs Detected

CVE-2006-20001 CVE-2018-19296 CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 CVE-2019-16220 CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 CVE-2019-16780 CVE-2019-16781 CVE-2019-17567 CVE-2019-17669 CVE-2019-17670 CVE-2019-17671 CVE-2019-17672 CVE-2019-17673 CVE-2019-17674 CVE-2019-17675 CVE-2019-20041 CVE-2019-20042 CVE-2019-20043 CVE-2020-11025 CVE-2020-11028 CVE-2020-11030 CVE-2020-11984 CVE-2020-11993 CVE-2020-13938 CVE-2020-13950 CVE-2020-1927 CVE-2020-1934 CVE-2020-25286 CVE-2020-28032 CVE-2020-28033 CVE-2020-28034 CVE-2020-28035 CVE-2020-28036 CVE-2020-28037 CVE-2020-28038 CVE-2020-28039 CVE-2020-28040 CVE-2020-35452 CVE-2020-36326 CVE-2020-9490 CVE-2021-26690 CVE-2021-26691 CVE-2021-29450 CVE-2021-33193 CVE-2021-34798 CVE-2021-36160 CVE-2021-39201 CVE-2021-39275 CVE-2021-40438 CVE-2021-44223 CVE-2021-44224 CVE-2021-44790 CVE-2022-21661 CVE-2022-21662 CVE-2022-21663 CVE-2022-21664 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 CVE-2022-26377 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31813 CVE-2022-3590 CVE-2022-36760 CVE-2022-37436 CVE-2022-43497 CVE-2022-43500 CVE-2022-43504 CVE-2023-22622 CVE-2023-25690 CVE-2023-27522

Map

Whois Information

  • inetnum: 190.103.202.0/24
  • status: reallocated
  • aut-num: N/A
  • owner: Coop. Electrica de Espartillar LTDA
  • ownerid: AR-CEEL1-LACNIC
  • responsible: ABUSE - Cooperativa de Espartillar
  • address: El Rosedal, 177,
  • address: 8171 - Espartillar - BA
  • country: AR
  • phone: +54 2923 494200
  • owner-c: JEK
  • tech-c: JEK
  • abuse-c: JEK
  • inetrev: 190.103.202.0/24
  • nserver: SAURION.COOPESPARTILLAR.COM.AR
  • nsstat: 20230422 UH
  • nslastaa: 20230419
  • nserver: ANARION.COOPESPARTILLAR.COM.AR [lame - not published]
  • nsstat: 20230422 UH
  • nslastaa: 20211103
  • created: 20081124
  • changed: 20081124
  • inetnum-up: 190.103.192.0/20
  • nic-hdl: JEK
  • person: ABUSE - Cooperativa de Espartillar
  • e-mail: [email protected]
  • address: El Rosedal, 177,
  • address: 8171 - Espartillar - BA
  • country: AR
  • phone: +54 2923 494200
  • created: 20081015
  • changed: 20110105

Links to attack logs

vultrparis-ssh-bruteforce-ip-list-2023-04-17 bruteforce-ip-list-2022-05-06 vultrparis-ssh-bruteforce-ip-list-2023-01-05 dotoronto-ssh-bruteforce-ip-list-2022-12-26 vultrmadrid-ssh-bruteforce-ip-list-2023-02-05 dosing-ssh-bruteforce-ip-list-2022-09-16 vultrwarsaw-ssh-bruteforce-ip-list-2022-07-25 vultrparis-ssh-bruteforce-ip-list-2022-10-24 dofrank-ssh-bruteforce-ip-list-2022-07-20 dofrank-ssh-bruteforce-ip-list-2022-08-21 vultrmadrid-ssh-bruteforce-ip-list-2022-11-02 dosing-ssh-bruteforce-ip-list-2023-03-21 bruteforce-ip-list-2022-04-29 bruteforce-ip-list-2022-05-14 vultrparis-ssh-bruteforce-ip-list-2022-12-12 vultrwarsaw-ssh-bruteforce-ip-list-2022-08-11 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-01 bruteforce-ip-list-2022-10-09 bruteforce-ip-list-2022-11-27 dofrank-ssh-bruteforce-ip-list-2023-02-09 dofrank-ssh-bruteforce-ip-list-2022-08-15 vultrparis-ssh-bruteforce-ip-list-2022-08-21 vultrmadrid-ssh-bruteforce-ip-list-2022-11-30 dosing-ssh-bruteforce-ip-list-2023-04-20 vultrmadrid-ssh-bruteforce-ip-list-2023-03-28 bruteforce-ip-list-2022-05-30 dofrank-ssh-bruteforce-ip-list-2023-01-03 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-10 vultrmadrid-ssh-bruteforce-ip-list-2022-11-29 dolondon-ssh-bruteforce-ip-list-2022-12-20 dolondon-ssh-bruteforce-ip-list-2022-07-19 vultrmadrid-ssh-bruteforce-ip-list-2022-08-17 bruteforce-ip-list-2022-10-26 bruteforce-ip-list-2022-04-12 dolondon-ssh-bruteforce-ip-list-2023-03-27 dosing-ssh-bruteforce-ip-list-2022-08-18 vultrparis-ssh-bruteforce-ip-list-2022-10-27 dolondon-ssh-bruteforce-ip-list-2022-11-11 vultrmadrid-ssh-bruteforce-ip-list-2022-12-31 vultrparis-ssh-bruteforce-ip-list-2022-11-28 dotoronto-ssh-bruteforce-ip-list-2023-01-14 vultrparis-ssh-bruteforce-ip-list-2023-02-21 vultrmadrid-ssh-bruteforce-ip-list-2023-01-25 bruteforce-ip-list-2022-12-06 dotoronto-ssh-bruteforce-ip-list-2022-08-30 dofrank-ssh-bruteforce-ip-list-2022-09-05