194.31.98.124 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Likely Malicious Host 🟠 60/100

Host and Network Information

  • Mitre ATT&CK IDs: T1003 - OS Credential Dumping, T1012 - Query Registry, T1016 - System Network Configuration Discovery, T1027 - Obfuscated Files or Information, T1033 - System Owner/User Discovery, T1046 - Network Service Scanning, T1055 - Process Injection, T1059 - Command and Scripting Interpreter, T1082 - System Information Discovery, T1083 - File and Directory Discovery, T1110 - Brute Force, T1113 - Screen Capture, T1114.001 - Local Email Collection, T1140 - Deobfuscate/Decode Files or Information, T1218 - Signed Binary Proxy Execution, T1547.001 - Registry Run Keys / Startup Folder, T1552.001 - Credentials In Files, T1555.003 - Credentials from Web Browsers, T1560 - Archive Collected Data, T1560.001 - Archive via Utility, T1566 - Phishing, T1566.001 - Spearphishing Attachment, T1573.001 - Symmetric Cryptography, T1573.002 - Asymmetric Cryptography
  • Tags: Bruteforce, Miscellaneous Sectors, Nextray, SSH, Scanner, Telnet, Webattack, apt, attack, beacon, belarus, bitcoin, blackenergy, boatlaunch, brute-force, bruteforce, cobalt strike, confuser, cowrie, crowview, cyber security, discord, download, downloader, dropper, elephant client, excel doc, february, fin7 boatlaunch, geopolitical conflict, ghostwriter, graphsteel, grimplant, intelligence, ioc, login, malicious, microbackdoor, persistence, phishing, please, powerplant c2, powerplant md5, powershell, regdword, scanner, scanning, sfx rar, sha256, smtp, ssh, t regdword, tcp, themida, ua cert, ukraine, unc1151, unc2589, whispergate
  • View other sources: Spamhaus VirusTotal

  • Country: United States of America
  • Network: AS213035 des capital b.v.
  • Noticed: 50 times
  • Protcols Attacked: ssh
  • Countries Attacked: Belarus, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Russian Federation, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Malware Detected on Host

Count: 3 74bb8bcd41e3342aaac741c1b0fc6487bc836522dfb8dc4bfe2df2667c9986df 9e9fa8b3b0a59762b429853a36674608df1fa7d7f7140c8fccd7c1946070995a d4c225eda36d52adf72fc9395a317932f8fa02156a8ce982e081b3f5f8a4a022

Map

Whois Information

  • inetnum: 194.31.98.0 - 194.31.98.255
  • netname: MEGACABLE-194-31-98-0
  • country: MX
  • geoloc: 19.4315604 -99.2148968
  • org: ORG-MCDM2-RIPE
  • admin-c: MCDM40-RIPE
  • tech-c: MCDM40-RIPE
  • status: ASSIGNED PA
  • mnt-by: PREFIXBROKER-MNT
  • created: 2022-10-21T10:37:17Z
  • last-modified: 2022-10-21T10:37:17Z
  • organisation: ORG-MCDM2-RIPE
  • org-name: Megacable Comunicaciones de Mexico, S.A. de C.V.
  • org-type: OTHER
  • address: Sierra Candela 111-Piso 8, Lomas de Chapultepec, Miguel Hidalgo
  • address: 11000 Ciudad de Mexico
  • address: CDMX
  • address: Mexico
  • abuse-c: MCDM40-RIPE
  • mnt-ref: PREFIXBROKER-MNT
  • mnt-by: PREFIXBROKER-MNT
  • created: 2022-10-21T10:37:14Z
  • last-modified: 2022-10-21T10:37:14Z
  • role: Megacable Comunicaciones de Mexico, S.A. de C.V. abuse handling
  • address: Sierra Candela 111-Piso 8, Lomas de Chapultepec, Miguel Hidalgo
  • address: 11000 Ciudad de Mexico
  • address: CDMX
  • address: Mexico
  • nic-hdl: MCDM40-RIPE
  • mnt-by: PREFIXBROKER-MNT
  • created: 2022-10-21T10:37:14Z
  • last-modified: 2022-10-21T10:37:14Z
  • abuse-mailbox: [email protected]
  • route: 194.31.98.0/24
  • origin: AS14178
  • mnt-by: PREFIXBROKER-MNT
  • created: 2022-10-21T10:37:17Z
  • last-modified: 2022-10-21T10:37:17Z

Links to attack logs

awsau-ssh-bruteforce-ip-list-2022-05-03 awsbah-ssh-bruteforce-ip-list-2022-05-22 awsjap-ssh-bruteforce-ip-list-2022-05-07