209.141.42.48 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Likely Malicious Host 🟠 55/100

Host and Network Information

  • Mitre ATT&CK IDs: T1027 - Obfuscated Files or Information, T1036 - Masquerading, T1049 - System Network Connections Discovery, T1055 - Process Injection, T1056 - Input Capture, T1068 - Exploitation for Privilege Escalation, T1082 - System Information Discovery, T1090 - Proxy, T1102 - Web Service, T1104 - Multi-Stage Channels, T1106 - Native API, T1127 - Trusted Developer Utilities Proxy Execution, T1134 - Access Token Manipulation, T1140 - Deobfuscate/Decode Files or Information, T1218 - Signed Binary Proxy Execution, T1496 - Resource Hijacking, T1525 - Implant Internal Image, T1548 - Abuse Elevation Control Mechanism, T1552 - Unsecured Credentials, T1553 - Subvert Trust Controls, T1562 - Impair Defenses, T1566 - Phishing
  • Tags: DNS, Malicious IP, Nextray, RDP, SSH, abuse, antivm, anydesk, asmresolver, assembly, asyncrat, awsau, awsbah, awsindia, awsjap, awssafrica, blacklist, botnet, bruteforce, bypass, click, computer security, config, confuserex, crowdstrike, cryptojacking, cyber attacks, cyber news, cyber security, cyber security news, cyber security news today, cyber security updates, cyber updates, daemonset, data breach, decoy, dero, dinvoke, dnsserver, docker image, dotrunpex, dword, error, fail2ban, falcon platform, february, figure, final, first, fraud, hacker news, hacking news, how to hack, implmap, information security, ioc, ipqs, ipqualityscore, koivm, kubernetes, kubernetes api, lemonduck, main, malicious, miner, mirai, monero, monero campaign, network security, nt api, ntp, null, phishing, pinvoke, powershell, raccoon, ransomware malware, rats, redline, scan, scanners, signs, snakekeylogger, software vulnerability, stealer, strings, syscall, tcp, the hacker news, tools, twitter, udp, web attack, win api, yaml file
  • View other sources: Spamhaus VirusTotal

  • Country: United States of America
  • Network: AS53667 frantech solutions
  • Noticed: 50 times
  • Protcols Attacked: ntp snmp
  • Countries Attacked: Australia, Bahrain, Canada, Czechia, Denmark, Estonia, France, Germany, India, Japan, Latvia, Lithuania, Norway, Poland, Romania, South Africa, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Open Ports Detected

22

Map

Whois Information

  • NetRange: 209.141.32.0 - 209.141.63.255
  • CIDR: 209.141.32.0/19
  • NetName: PONYNET-04
  • NetHandle: NET-209-141-32-0-1
  • Parent: NET209 (NET-209-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS53667
  • Organization: FranTech Solutions (SYNDI-5)
  • RegDate: 2011-01-27
  • Updated: 2012-03-25
  • Ref: https://rdap.arin.net/registry/ip/209.141.32.0
  • OrgName: FranTech Solutions
  • OrgId: SYNDI-5
  • Address: 1621 Central Ave
  • City: Cheyenne
  • StateProv: WY
  • PostalCode: 82001
  • Country: US
  • RegDate: 2010-07-21
  • Updated: 2017-01-28
  • Ref: https://rdap.arin.net/registry/entity/SYNDI-5
  • OrgAbuseHandle: FDI19-ARIN
  • OrgAbuseName: Dias, Francisco
  • OrgAbusePhone: +1-778-977-8246
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/FDI19-ARIN
  • OrgTechHandle: FDI19-ARIN
  • OrgTechName: Dias, Francisco
  • OrgTechPhone: +1-778-977-8246
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/FDI19-ARIN

Links to attack logs

awssafrica-ntp-bruteforce-ip-list-2022-01-17 dolondon-snmp-bruteforce-ip-list-2021-12-12 ntp-bruteforce-ip-list-2021-12-13 awsau-ntp-bruteforce-ip-list-2021-12-16 awsjap-ntp-bruteforce-ip-list-2021-12-19 ntp-bruteforce-ip-list-2021-12-19 awsbah-ntp-bruteforce-ip-list-2021-12-28 ntp-bruteforce-ip-list-2022-01-05 ntp-bruteforce-ip-list-2022-01-09 awsau-ntp-bruteforce-ip-list-2022-01-10 awsindia-ntp-bruteforce-ip-list-2022-01-15 awsau-ntp-bruteforce-ip-list-2021-12-11 awsbah-ntp-bruteforce-ip-list-2021-12-19 ntp-bruteforce-ip-list-2021-12-24 awsau-ntp-bruteforce-ip-list-2021-12-27 ntp-bruteforce-ip-list-2021-12-27 awsau-ntp-bruteforce-ip-list-2021-12-28 ntp-bruteforce-ip-list-2021-12-28 awsau-ntp-bruteforce-ip-list-2022-01-13 dotoronto-snmp-bruteforce-ip-list-2021-12-12 awsau-ntp-bruteforce-ip-list-2021-12-14 awsbah-ntp-bruteforce-ip-list-2021-12-27 awsbah-ntp-bruteforce-ip-list-2022-01-03 awsjap-ntp-bruteforce-ip-list-2022-01-11 ntp-bruteforce-ip-list-2022-01-15 awsindia-ntp-bruteforce-ip-list-2022-01-17 awsbah-ntp-bruteforce-ip-list-2021-12-14 awsbah-ntp-bruteforce-ip-list-2021-12-15 awsau-ntp-bruteforce-ip-list-2021-12-17 ntp-bruteforce-ip-list-2021-12-17 awsjap-ntp-bruteforce-ip-list-2021-12-23 awsjap-ntp-bruteforce-ip-list-2022-01-08 awsjap-ntp-bruteforce-ip-list-2022-01-10 awsbah-ntp-bruteforce-ip-list-2022-01-11 awsau-ntp-bruteforce-ip-list-2022-01-15 awsbah-ntp-bruteforce-ip-list-2021-12-16 awsbah-ntp-bruteforce-ip-list-2021-12-17 awsau-ntp-bruteforce-ip-list-2021-12-19 awsau-ntp-bruteforce-ip-list-2021-12-23 awsbah-ntp-bruteforce-ip-list-2021-12-30 awsjap-ntp-bruteforce-ip-list-2022-01-03 ntp-bruteforce-ip-list-2022-01-03 awsbah-ntp-bruteforce-ip-list-2022-01-05 awsau-ntp-bruteforce-ip-list-2022-01-09 awssafrica-ntp-bruteforce-ip-list-2022-01-15 awsbah-ntp-bruteforce-ip-list-2022-01-17 awsbah-ntp-bruteforce-ip-list-2021-12-11 ntp-bruteforce-ip-list-2021-12-11 awsbah-ntp-bruteforce-ip-list-2021-12-13 ntp-bruteforce-ip-list-2021-12-14 ntp-bruteforce-ip-list-2021-12-16 awsbah-ntp-bruteforce-ip-list-2021-12-23 awsjap-ntp-bruteforce-ip-list-2022-01-02 awsau-ntp-bruteforce-ip-list-2022-01-08 ntp-bruteforce-ip-list-2022-01-08 awsbah-ntp-bruteforce-ip-list-2022-01-09 ntp-bruteforce-ip-list-2022-01-10 awsau-snmp-bruteforce-ip-list-2021-12-12 dofrank-snmp-bruteforce-ip-list-2021-12-12 dosing-snmp-bruteforce-ip-list-2021-12-12 vultrparis-snmp-bruteforce-ip-list-2021-12-12 awsbah-ntp-bruteforce-ip-list-2021-12-18 awsjap-ntp-bruteforce-ip-list-2021-12-18 awsjap-ntp-bruteforce-ip-list-2021-12-24 awsjap-ntp-bruteforce-ip-list-2021-12-27 awsbah-ntp-bruteforce-ip-list-2022-01-02 awsbah-ntp-bruteforce-ip-list-2022-01-10 ntp-bruteforce-ip-list-2022-01-13 awsau-ntp-bruteforce-ip-list-2021-12-13 awsau-ntp-bruteforce-ip-list-2021-12-15 awsjap-ntp-bruteforce-ip-list-2021-12-17 ntp-bruteforce-ip-list-2021-12-18 awsau-ntp-bruteforce-ip-list-2021-12-31 awsau-ntp-bruteforce-ip-list-2022-01-03 ntp-bruteforce-ip-list-2022-01-11 awsbah-snmp-bruteforce-ip-list-2021-12-12 snmp-bruteforce-ip-list-2021-12-12 ntp-bruteforce-ip-list-2021-12-15 awsau-ntp-bruteforce-ip-list-2021-12-18 ntp-bruteforce-ip-list-2021-12-23 awsjap-ntp-bruteforce-ip-list-2021-12-28 awsjap-ntp-bruteforce-ip-list-2021-12-31 awsjap-ntp-bruteforce-ip-list-2022-01-15 ntp-bruteforce-ip-list-2022-01-17 awsau-ntp-bruteforce-ip-list-2021-12-24 awsbah-ntp-bruteforce-ip-list-2021-12-24 ntp-bruteforce-ip-list-2022-01-02 awsjap-ntp-bruteforce-ip-list-2022-01-05 awsbah-ntp-bruteforce-ip-list-2022-01-08 awsjap-ntp-bruteforce-ip-list-2022-01-13 awsbah-ntp-bruteforce-ip-list-2022-01-15