212.112.97.27 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 212.112.97.27 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 30/100

Host and Network Information

  • Tags: Nextray, cyber security, ioc, malicious, phishing

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: cruzit_web_attacks

  • Country: Kyrgyzstan
  • Network: AS12764 aknet ltd.
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: gov.kg

Malware Detected on Host

Count: 27 142e6693031a567c5204564fabb66b5e543aeb9a03047ad9dac4c60f17542d6c 9c008b1e49c99d5b11592ef35112218a09541b441805871bd7a957160cc377e0 bbae769b3946fe7bffc4a8cac2f6dec912acb87a6a90ca16852e9744a4577dc6 d58be98ad243a4c220ce566b7912759b7d21cfe2625dac007c2b0952bb0e1844 5382c70635cb4693813256303dc348825b8712be19a30fcdea8be615e97d8cbd 4999131b1c2b50e35eca4ce747e1162efb31c16627c534dd46544c2107e47f4f 802dad14a175a1e9140a901c857cf94c625f5c365f511995c9e80c74811b4451 c010139a43bc8cb724f9bdf30c5b4627b97db6c0acf74c649a60e4668b872fb0 e642f7afe2da98cec978a23f0d8e0049bf3eb72d8a33a71dd8fd4caf3c9892b8 62cf57371aed7fe39fcbe2dcf25006b290d2508e0dc1b82c584f37cb542e4039

Map

Whois Information

  • inetnum: 212.112.96.0 - 212.112.98.255
  • netname: AKNET
  • descr: AKNET Educational and Science
  • descr: Network IP Address Space
  • country: KG
  • admin-c: AU2408-RIPE
  • tech-c: IM5222-RIPE
  • status: ASSIGNED PA
  • mnt-by: AS12764-MNT
  • created: 2002-01-31T08:57:20Z
  • last-modified: 2011-12-28T08:47:48Z
  • person: Azamat Umurzakov
  • address: AKNET Ltd.
  • address: 265a Chui ave, office 114
  • address: Bishkek, 720071, Kyrgyzstan
  • phone: +996 312 611155
  • fax-no: +996 312 611151
  • nic-hdl: AU2408-RIPE
  • mnt-by: AS12764-MNT
  • created: 2011-12-28T08:45:47Z
  • last-modified: 2011-12-28T08:45:47Z
  • person: Ildar Mursalimov
  • address: AKNET Ltd.
  • address: 265a Chui ave, office 114
  • address: Bishkek, 720071, Kyrgyzstan
  • phone: +996 312 611155
  • fax-no: +996 312 611151
  • nic-hdl: IM5222-RIPE
  • mnt-by: AS12764-MNT
  • created: 2011-12-28T06:33:04Z
  • last-modified: 2011-12-28T06:33:04Z
  • route: 212.112.97.0/24
  • descr: AkNet Route
  • origin: AS12764
  • mnt-by: AS12764-MNT
  • created: 2012-12-07T11:06:23Z
  • last-modified: 2012-12-07T11:06:23Z

Links to attack logs

anonymous-proxy-ip-list-2023-07-27