3.106.137.90 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 3.106.137.90 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 15/100

Host and Network Information

  • JARM: 2ad2ad00000000022c42d42d0000008aa043a2ae70f1a4f70c9b5036ea9f77

  • View other sources: Spamhaus VirusTotal

  • Country: Australia
  • Network: AS16509 amazon.com inc
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy
  • Passive DNS Results: angry-khayyam.3-106-137-90.plesk.page

Open Ports Detected

10001 10134 1023 10243 1025 104 10443 11 11000 111 11211 113 11371 1153 1200 1234 13 1311 14147 1433 1471 1521 1599 16010 16030 161 17 175 179 18245 1833 19 1900 19000 1911 19132 1925 1935 195 1981 2000 2030 20547 2067 2069 2070 2082 2086 2087 21 211 2121 2154 2181 22 2222 23 2323 23424 2345 2375 2404 2455 2480 25 25565 26 2628 27015 27036 2761 28015 28017 2985 3000 30002 3001 3079 3104 3105 311 32400 3260 3268 32764 3283 3299 3333 3389 3391 3483 35000 3522 3541 3542 3551 3552 3689 37 37215 3749 3790 4000 4022 4040 4063 4118 41800 4242 4282 4369 443 444 4443 4444 44818 4506 465 4782 47990 4840 48899 4899 4911 49152 500 50000 5001 50050 5006 50070 5010 502 503 5050 51106 51235 5201 5222 5269 53 5353 5435 554 5542 55443 5555 55553 55554 5560 5591 5596 5601 5632 5672 5683 5801 5858 587 5900 5901 593 5985 5986 6000 6264 636 6443 6601 6633 6650 666 6667 6668 6748 69 6969 70 7003 7070 7171 7434 7443 7445 7465 7474 7547 7548 7634 771 7777 7779 79 7998 80 8000 8009 8040 8053 8060 8080 8083 8085 8086 81 8102 8106 8123 8140 8181 8182 8190 8238 8291 83 8333 84 8405 8443 8500 8554 8733 8765 8767 8779 88 8800 8812 8820 8847 8852 8853 8855 8880 8888 8891 9001 9005 9009 902 9038 9042 9045 9051 9080 9090 9095 9100 9111 9151 9160 9211 9302 9306 9308 9418 9600 9869 992 9944 995 9981 9999

CVEs Detected

CVE-2001-1556 CVE-2002-0655 CVE-2002-0656 CVE-2002-0659 CVE-2003-0016 CVE-2003-0017 CVE-2003-0020 CVE-2003-0078 CVE-2003-0083 CVE-2003-0131 CVE-2003-0132 CVE-2003-0134 CVE-2003-0147 CVE-2003-0189 CVE-2003-0192 CVE-2003-0245 CVE-2003-0253 CVE-2003-0254 CVE-2003-0542 CVE-2003-0789 CVE-2003-0851 CVE-2003-1307 CVE-2004-0079 CVE-2004-0081 CVE-2004-0112 CVE-2004-0113 CVE-2004-0174 CVE-2004-0263 CVE-2004-0488 CVE-2004-0747 CVE-2004-0748 CVE-2004-0786 CVE-2004-0809 CVE-2004-0885 CVE-2004-0942 CVE-2004-0975 CVE-2004-1834 CVE-2004-2343 CVE-2005-1268 CVE-2005-1797 CVE-2005-2088 CVE-2005-2700 CVE-2005-2728 CVE-2005-2946 CVE-2005-2970 CVE-2005-3352 CVE-2005-3357 CVE-2006-0225 CVE-2006-20001 CVE-2006-2940 CVE-2006-4154 CVE-2006-4339 CVE-2006-4924 CVE-2006-5051 CVE-2006-5052 CVE-2006-5752 CVE-2006-5794 CVE-2006-7250 CVE-2007-2243 CVE-2007-3108 CVE-2007-3304 CVE-2007-3847 CVE-2007-4465 CVE-2007-4752 CVE-2007-5000 CVE-2007-6388 CVE-2007-6750 CVE-2008-0005 CVE-2008-2168 CVE-2008-2364 CVE-2008-2384 CVE-2008-2939 CVE-2008-3259 CVE-2008-4109 CVE-2008-5077 CVE-2008-5161 CVE-2008-7270 CVE-2009-0590 CVE-2009-0789 CVE-2009-1195 CVE-2009-1377 CVE-2009-1378 CVE-2009-1386 CVE-2009-1387 CVE-2009-1891 CVE-2009-3094 CVE-2009-3095 CVE-2009-3245 CVE-2009-3555 CVE-2009-4355 CVE-2010-0425 CVE-2010-0433 CVE-2010-0434 CVE-2010-0742 CVE-2010-1623 CVE-2010-4180 CVE-2010-4252 CVE-2010-4478 CVE-2010-4755 CVE-2010-5107 CVE-2010-5298 CVE-2011-0419 CVE-2011-1473 CVE-2011-1945 CVE-2011-3192 CVE-2011-3368 CVE-2011-3607 CVE-2011-3639 CVE-2011-4108 CVE-2011-4317 CVE-2011-4327 CVE-2011-4415 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2011-4718 CVE-2011-5000 CVE-2012-0027 CVE-2012-0031 CVE-2012-0053 CVE-2012-0814 CVE-2012-0884 CVE-2012-1165 CVE-2012-2110 CVE-2012-2333 CVE-2012-6708 CVE-2013-0166 CVE-2013-1862 CVE-2013-6449 CVE-2013-6501 CVE-2013-7327 CVE-2014-0076 CVE-2014-0224 CVE-2014-0231 CVE-2014-0236 CVE-2014-1692 CVE-2014-2020 CVE-2014-2532 CVE-2014-2653 CVE-2014-3470 CVE-2014-3567 CVE-2014-3568 CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-4670 CVE-2014-5459 CVE-2014-8176 CVE-2014-8275 CVE-2014-9425 CVE-2014-9426 CVE-2014-9767 CVE-2015-0204 CVE-2015-0209 CVE-2015-0228 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293 CVE-2015-1351 CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3195 CVE-2015-4000 CVE-2015-4116 CVE-2015-4601 CVE-2015-5352 CVE-2015-5600 CVE-2015-6563 CVE-2015-6564 CVE-2015-7803 CVE-2015-7804 CVE-2015-8865 CVE-2015-8874 CVE-2015-8877 CVE-2015-8879 CVE-2015-8994 CVE-2015-9251 CVE-2015-9253 CVE-2016-0703 CVE-2016-0704 CVE-2016-10009 CVE-2016-10010 CVE-2016-10011 CVE-2016-10012 CVE-2016-10158 CVE-2016-10159 CVE-2016-10161 CVE-2016-10397 CVE-2016-10708 CVE-2016-10712 CVE-2016-1903 CVE-2016-1908 CVE-2016-20012 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 CVE-2016-2176 CVE-2016-2554 CVE-2016-3141 CVE-2016-3142 CVE-2016-4070 CVE-2016-4342 CVE-2016-4343 CVE-2016-4537 CVE-2016-4538 CVE-2016-4539 CVE-2016-4540 CVE-2016-4541 CVE-2016-4542 CVE-2016-4543 CVE-2016-5093 CVE-2016-5094 CVE-2016-5095 CVE-2016-5096 CVE-2016-5114 CVE-2016-5399 CVE-2016-5768 CVE-2016-5769 CVE-2016-5770 CVE-2016-5771 CVE-2016-5772 CVE-2016-5773 CVE-2016-6288 CVE-2016-6289 CVE-2016-6290 CVE-2016-6291 CVE-2016-6292 CVE-2016-6294 CVE-2016-6295 CVE-2016-6296 CVE-2016-6297 CVE-2016-7056 CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418 CVE-2016-7478 CVE-2016-8612 CVE-2016-9137 CVE-2016-9138 CVE-2016-9934 CVE-2016-9935 CVE-2017-11142 CVE-2017-11143 CVE-2017-11144 CVE-2017-11145 CVE-2017-11628 CVE-2017-12933 CVE-2017-15906 CVE-2017-16642 CVE-2017-16944 CVE-2017-7272 CVE-2017-7890 CVE-2017-7963 CVE-2017-9224 CVE-2017-9226 CVE-2017-9788 CVE-2017-9798 CVE-2018-10545 CVE-2018-10546 CVE-2018-10547 CVE-2018-10548 CVE-2018-10549 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-14851 CVE-2018-14883 CVE-2018-15132 CVE-2018-15473 CVE-2018-17082 CVE-2018-19395 CVE-2018-19396 CVE-2018-19520 CVE-2018-20685 CVE-2018-20783 CVE-2018-7584 CVE-2019-11358 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2019-9020 CVE-2019-9021 CVE-2019-9023 CVE-2019-9024 CVE-2019-9637 CVE-2019-9638 CVE-2019-9639 CVE-2019-9641 CVE-2020-11022 CVE-2020-11023 CVE-2020-15778 CVE-2021-34798 CVE-2021-36368 CVE-2021-39275 CVE-2021-40438 CVE-2021-4044 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31628 CVE-2022-31629 CVE-2022-31813 CVE-2022-37436 CVE-2023-38408 CVE-2023-48795 CVE-2023-51384 CVE-2023-51385

Map

Whois Information

  • NetRange: 3.0.0.0 - 3.127.255.255
  • CIDR: 3.0.0.0/9
  • NetName: AT-88-Z
  • NetHandle: NET-3-0-0-0-1
  • Parent: NET3 (NET-3-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS:
  • Organization: Amazon Technologies Inc. (AT-88-Z)
  • RegDate: 2017-12-20
  • Updated: 2022-05-18
  • Ref: https://rdap.arin.net/registry/ip/3.0.0.0
  • OrgName: Amazon Technologies Inc.
  • OrgId: AT-88-Z
  • Address: 410 Terry Ave N.
  • City: Seattle
  • StateProv: WA
  • PostalCode: 98109
  • Country: US
  • RegDate: 2011-12-08
  • Updated: 2022-09-30
  • Comment: All abuse reports MUST include:
  • Comment: * src IP
  • Comment: * dest IP (your IP)
  • Comment: * dest port
  • Comment: * Accurate date/timestamp and timezone of activity
  • Comment: * Intensity/frequency (short log extracts)
  • Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
  • Ref: https://rdap.arin.net/registry/entity/AT-88-Z
  • OrgRoutingHandle: IPROU3-ARIN
  • OrgRoutingName: IP Routing
  • OrgRoutingPhone: +1-206-555-0000
  • OrgRoutingEmail: [email protected]
  • OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
  • OrgTechHandle: ANO24-ARIN
  • OrgTechName: Amazon EC2 Network Operations
  • OrgTechPhone: +1-206-555-0000
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
  • OrgRoutingHandle: ARMP-ARIN
  • OrgRoutingName: AWS RPKI Management POC
  • OrgRoutingPhone: +1-206-555-0000
  • OrgRoutingEmail: [email protected]
  • OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
  • OrgNOCHandle: AANO1-ARIN
  • OrgNOCName: Amazon AWS Network Operations
  • OrgNOCPhone: +1-206-555-0000
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
  • OrgAbuseHandle: AEA8-ARIN
  • OrgAbuseName: Amazon EC2 Abuse
  • OrgAbusePhone: +1-206-555-0000
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
  • NetRange: 3.104.0.0 - 3.107.255.255
  • CIDR: 3.104.0.0/14
  • NetName: AMAZO-SYD
  • NetHandle: NET-3-104-0-0-1
  • Parent: AT-88-Z (NET-3-0-0-0-1)
  • NetType: Reallocated
  • OriginAS: AS16509
  • Organization: Amazon Corporate Services Pty Ltd (ACSPL-2)
  • RegDate: 2018-11-01
  • Updated: 2018-11-01
  • Ref: https://rdap.arin.net/registry/ip/3.104.0.0
  • OrgName: Amazon Corporate Services Pty Ltd
  • OrgId: ACSPL-2
  • Address: 400 Harris Street
  • Address: Ultimo
  • City: Sydney
  • StateProv: NSW
  • PostalCode: 2006
  • Country: AU
  • RegDate: 2014-07-18
  • Updated: 2014-07-18
  • Ref: https://rdap.arin.net/registry/entity/ACSPL-2
  • OrgAbuseHandle: AEA8-ARIN
  • OrgAbuseName: Amazon EC2 Abuse
  • OrgAbusePhone: +1-206-555-0000
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
  • OrgNOCHandle: AANO1-ARIN
  • OrgNOCName: Amazon AWS Network Operations
  • OrgNOCPhone: +1-206-555-0000
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
  • OrgTechHandle: ANO24-ARIN
  • OrgTechName: Amazon EC2 Network Operations
  • OrgTechPhone: +1-206-555-0000
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN

Links to attack logs

anonymous-proxy-ip-list-2023-12-30