23.95.132.48 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 23.95.132.48 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 35/100

Host and Network Information

  • Mitre ATT&CK IDs: T1110 - Brute Force
  • Tags: Bruteforce, Malicious IP, Nextray, SSH, blacklist, bruteforce, cowrie, cyber security, fail2ban, ioc, la, lafusioncenter, louisiana, malicious, phishing, scan, ssh, tcp, tsec
  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: b3b0, haley_ssh

  • Country: United States
  • Network: AS36352 colocrossing
  • Noticed: 1 times
  • Protcols Attacked: SSH
  • Countries Attacked: Australia, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: bhunting.xyz filesoft.ir

Malware Detected on Host

Count: 67 1c5242226fffad0ab8b134d4faf789b7d767d4c17c0e9e076d5d0a555bae7829 c3abee8bd72e6c13553aa74f221b7849660e2074634b3e21a859756e456bfc58 63901b1707ba5d04841a842ae5ac55b4bb93c6da3b164b7db0776a0c9a337200 608323011b218311fa3e65a2cc8cffafdff5c2b7c5e1fd6ba58032affbccc692 6159b53be6c513c881169d9bfd250ea8214691d7c97ea445d3da6d0f8784dfb0 7b78c8088e21a47df829baa76d8811de6fafe57ef3ad786584f036d52451e8cd 60470296057ab207641bc3e53315e7420d56a143a5d7a0a9583f365f28a9b06c c5f5e9858d49732df410bd95e70a7d44629aa06883d6401d5fbce52daba8351e b1837e64ea13983ec9c73bfdc31831bbd839f2e3c0541ea281294c9b4187dd1f 4c422c7a5add68d783645ffefc3a4862033ea59d4469a3ebac5d7db881a90ad3

Map

Whois Information

  • NetRange: 23.94.0.0 - 23.95.255.255
  • CIDR: 23.94.0.0/15
  • NetName: CC-16
  • NetHandle: NET-23-94-0-0-1
  • Parent: NET23 (NET-23-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS36352
  • Organization: ColoCrossing (VGS-9)
  • RegDate: 2013-08-16
  • Updated: 2013-08-16
  • Ref: https://rdap.arin.net/registry/ip/23.94.0.0
  • OrgName: ColoCrossing
  • OrgId: VGS-9
  • Address: 325 Delaware Avenue
  • Address: Suite 300
  • City: Buffalo
  • StateProv: NY
  • PostalCode: 14202
  • Country: US
  • RegDate: 2005-06-20
  • Updated: 2023-05-11
  • Ref: https://rdap.arin.net/registry/entity/VGS-9
  • OrgAbuseHandle: ABUSE3246-ARIN
  • OrgAbuseName: Abuse
  • OrgAbusePhone: +1-800-518-9716
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3246-ARIN
  • OrgTechHandle: NETWO882-ARIN
  • OrgTechName: Network Operations
  • OrgTechPhone: +1-800-518-9716
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/NETWO882-ARIN
  • OrgNOCHandle: NETWO882-ARIN
  • OrgNOCName: Network Operations
  • OrgNOCPhone: +1-800-518-9716
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO882-ARIN

Links to attack logs

bruteforce-ip-list-2021-09-06 bruteforce-ip-list-2021-08-10 bruteforce-ip-list-2021-02-01 bruteforce-ip-list-2021-01-31