4.2.2.5 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 4.2.2.5 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 30/100

Host and Network Information

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: b3b0, bitcoin_blockchain_info_30d, bitcoin_blockchain_info_7d, bitcoin_nodes, bitcoin_nodes_1d, bitcoin_nodes_30d, bitcoin_nodes_7d, blocklist_de, blocklist_de_apache, blocklist_de_bruteforce, blocklist_net_ua, botscout_30d, botscout_7d, cleanmx_phishing, cleanmx_viruses, cleantalk_30d, cleantalk_7d, cleantalk_new_30d, cleantalk_updated_30d, cleantalk_updated_7d, cobaltstrike, coinbl_hosts, cruzit_web_attacks, dm_tor, esentire_22072014a_com, esentire_22072014b_com, esentire_22072014c_com, esentire_crazyerror_su, esentire_dorttlokolrt_com, esentire_emptyarray_ru, esentire_getarohirodrons_com, esentire_inleet_ru, esentire_maddox1_ru, esentire_volaya_ru, et_tor, haley_ssh, hphosts_ats, hphosts_emd, hphosts_fsa, hphosts_psh, lashback_ubl, nixspam, nullsecure, php_dictionary_30d, php_spammers_30d, proxylists_30d, proxylists_7d, sblam, snort_ipfilter, socks_proxy, socks_proxy_1d, socks_proxy_30d, socks_proxy_7d, sslproxies_30d, stopforumspam, stopforumspam_180d, stopforumspam_30d, stopforumspam_365d, stopforumspam_7d, stopforumspam_90d, taichung, talosintel_ipfilter, turris_greylist, urandomusto_smb, uscert_hidden_cobra

  • Country: United States
  • Network:
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy
  • Passive DNS Results: e.resolvers.level3.net alipilevar.com

Malware Detected on Host

Count: 20 c58061c7732bd68596747141ba927e990996697da4a563065082412df6384f21 6298f8cf0594329f7059e1306174c0afd48ddd81a982f7f155393618ad35b0a7 ab42c94fc03ddbf446319772518b229d7b2e2546fdddaae7c01abe0fa8a02be1 8fc219903c5cc104348f871d25e969bd6657b83fc731897b15072345f6eaeb26 26f3f2fb9e530a77b5ee5d400207f06e11519a967df27166e0ef1d5975b93054 3ca6deaac0a5790474a9289755e82e7b43460b360e5500d7c9715c7be156b568 dba741108e47697fe61c1d77282b33e94a4ffb7fd292cc7c236ca9937f31034b 0efcb331558446a46c247f372bed69f1cfc660a56a2170b93543cfa9ff82537e 6b8bfed1264f9cfee14e19f6c485b3db0347b83e461fefc6c2da7a202e802c5e 76872fa02765a5bdce305c513d0d59f4ce4dbbd7cbd7b0aad22def106dfd20cc

Open Ports Detected

53

Map

Whois Information

  • NetRange: 4.0.0.0 - 4.127.255.255
  • CIDR: 4.0.0.0/9
  • NetName: LVLT-ORG-4-8
  • NetHandle: NET-4-0-0-0-1
  • Parent: NET4 (NET-4-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS:
  • Organization: Level 3 Parent, LLC (LPL-141)
  • RegDate: 1992-12-01
  • Updated: 2019-07-17
  • Ref: https://rdap.arin.net/registry/ip/4.0.0.0
  • OrgName: Level 3 Parent, LLC
  • OrgId: LPL-141
  • Address: 100 CenturyLink Drive
  • City: Monroe
  • StateProv: LA
  • PostalCode: 71203
  • Country: US
  • RegDate: 2018-02-06
  • Updated: 2023-04-07
  • Comment: USAGE OF IP SPACE MUST COMPLY WITH OUR ACCEPTABLE USE POLICY:
  • Comment: https://www.lumen.com/en-us/about/legal/acceptable-use-policy.html
  • Comment:
  • Comment:
  • Comment: 1. You are permitted to route the Lumen IP prefixes listed via Public BGP to your alternate ISP from your ASN. Any other ASN originating the prefix listed is forbidden.
  • Comment: 2. The Lumen IP prefixes listed can be routed via Public BGP to your alternate ISP as long as you remain an active customer with Lumen and continue to route the prefixes over at least one Lumen Internet circuit without significant traffic engineering.
  • Comment: 3. Should your Internet services with Lumen be discontinued, Lumen reserves the right to have your alternate ISP terminate the routing of the Lumen IP prefixes without advanced notification, should you fail to do so.
  • Comment: 4. All IP Addresses assigned or allocated by Lumen to an end-user (customer or ISP) shall be considered non-portable and will be reclaimed by Lumen upon service termination.
  • Comment: 5. Lumen reserves the right to conduct audits to ensure the LOA conditions are being met.
  • Comment:
  • Comment: Our looking glass is located at: https://lookingglass.centurylink.com/
  • Comment:
  • Comment: For subpoena or court order please fax 844.254.5800 or refer to our Trust & Safety page:
  • Comment: https://www.lumen.com/en-us/about/legal/trust-center/trust-and-safety.html
  • Comment:
  • Comment: For abuse issues, please email [email protected]
  • Comment: All abuse reports MUST include:
  • Comment: * src IP
  • Comment: * dest IP (your IP)
  • Comment: * dest port
  • Comment: * Accurate date/timestamp and timezone of activity
  • Comment: * Intensity/frequency (short log extracts)
  • Comment: * Your contact details (phone and email)
  • Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
  • Ref: https://rdap.arin.net/registry/entity/LPL-141
  • OrgAbuseHandle: LAC56-ARIN
  • OrgAbuseName: L3 Abuse Contact
  • OrgAbusePhone: +1-877-453-8353
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/LAC56-ARIN
  • OrgTechHandle: APL7-ARIN
  • OrgTechName: ADMIN POC LVLT
  • OrgTechPhone: +1-877-453-8353
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/APL7-ARIN

Links to attack logs

nmap-scanning-list-2020-10-15 nmap-scanning-list-2020-12-23 aws-ssh-bruteforce-ip-list-2021-07-06 dofrank-telnet-bruteforce-ip-list-2023-03-18 dobengaluru-telnet-bruteforce-ip-list-2023-02-19 dobengaluru-telnet-bruteforce-ip-list-2023-03-07 bruteforce-ip-list-2021-05-20 bruteforce-ip-list-2021-08-17 dotoronto-telnet-bruteforce-ip-list-2021-08-23 awsau-redis-bruteforce-ip-list-2021-08-25 brazil-attackers-ip-list-2022-06-28 dotoronto-telnet-bruteforce-ip-list-2021-10-08 vultrwarsaw-ssh-bruteforce-ip-list-2023-01-22 bruteforce-ip-list-2022-06-21 doamsterdam-telnet-bruteforce-ip-list-2023-03-04 aws-redis-bruteforce-ip-list-2021-07-17 awsau-redis-bruteforce-ip-list-2022-02-11 bruteforce-ip-list-2022-05-19 dotoronto-ssh-bruteforce-ip-list-2023-04-25 forum-spam-ip-list-2014-03-11 forum-spam-ip-list-2014-05-10 dosing-ssh-bruteforce-ip-list-2023-06-07 dotoronto-ssh-bruteforce-ip-list-2023-02-20 nmap-scanning-hosts-2020-09-24 bruteforce-files-list-2020-10-24 forum-spam-ip-list-2021-03-18 bruteforce-ip-list-2021-07-07 awsindia-redis-bruteforce-ip-list-2022-03-30 roxy-ip-list-2023-05-03 vultrparis-mssql-bruteforce-ip-list-2022-09-15 telnet-bruteforce-ip-list-2022-11-05 anonymous-proxy-ip-list-2023-05-25 forum-spam-ip-list-2015-04-08 awsau-mssql-bruteforce-ip-list-2020-08-26 bruteforce-files-list-2020-08-29 dosing-telnet-bruteforce-ip-list-2021-09-26 dosing-ssh-bruteforce-ip-list-2023-05-29 bruteforce-ip-list-2020-06-29 forum-spam-ip-list-2021-07-19 bruteforce-ip-list-2021-09-18 awsindia-redis-bruteforce-ip-list-2022-03-19 bruteforce-ip-list-2022-03-27 dosing-ssh-bruteforce-ip-list-2022-08-12 doamsterdam-telnet-bruteforce-ip-list-2022-08-13 anonymous-proxy-ip-list-2023-05-19 anonymous-proxy-ip-list-2023-05-27 dolondon-telnet-bruteforce-ip-list-2021-04-02 bruteforce-ip-list-2020-02-04 dosing-ssh-bruteforce-ip-list-2022-07-13 dotoronto-telnet-bruteforce-ip-list-2023-02-07 dofrank-ssh-bruteforce-ip-list-2022-06-15 doamsterdam-telnet-bruteforce-ip-list-2022-06-19 bruteforce-files-list-2021-02-16 vultrmadrid-ssh-bruteforce-ip-list-2023-01-27 bruteforce-ip-list-2021-08-22 bruteforce-ip-list-2021-08-23 awsau-redis-bruteforce-ip-list-2021-09-07 dotoronto-ssh-bruteforce-ip-list-2022-06-22 vultrmadrid-telnet-bruteforce-ip-list-2022-07-05 dotoronto-telnet-bruteforce-ip-list-2022-07-09 vultrmadrid-ssh-bruteforce-ip-list-2023-04-18 anonymous-proxy-ip-list-2023-05-29 bruteforce-ip-list-2021-02-18 dolondon-ssh-bruteforce-ip-list-2023-02-21 telnet-bruteforce-ip-list-2021-01-21 bruteforce-ip-list-2021-01-27 bruteforce-ip-list-2021-08-28 awsau-telnet-bruteforce-ip-list-2021-08-29 awsau-redis-bruteforce-ip-list-2022-02-13 dolondon-telnet-bruteforce-ip-list-2022-09-25 brazil-attackers-ip-list-2022-06-27 vultrwarsaw-ssh-bruteforce-ip-list-2022-07-20 dobengaluru-mssql-bruteforce-ip-list-2022-09-09 dolondon-ssh-bruteforce-ip-list-2022-10-15 dobengaluru-telnet-bruteforce-ip-list-2022-10-24 forum-spam-ip-list-2015-03-13 anonymous-proxy-ip-list-2023-05-26 nmap-scanning-list-2020-12-16 nmap-scanning-hosts-2020-08-08 anonymous-proxy-ip-list-2023-05-17 forum-spam-ip-list-2023-02-20 anonymous-proxy-ip-list-2023-05-20 aws-ntp-bruteforce-ip-list-2021-05-31 dosing-telnet-bruteforce-ip-list-2022-03-03 awsjap-redis-bruteforce-ip-list-2022-03-23 vultrwarsaw-ssh-bruteforce-ip-list-2022-07-17 anonymous-proxy-ip-list-2023-05-18 doamsterdam-telnet-bruteforce-ip-list-2023-03-14 dolondon-telnet-bruteforce-ip-list-2023-06-06 forum-spam-ip-list-2021-03-12 vultrwarsaw-ssh-bruteforce-ip-list-2023-04-06 nmap-scanning-list-2021-01-15 bruteforce-ip-list-2021-02-06 bruteforce-ip-list-2021-04-21 aws-redis-bruteforce-ip-list-2021-07-14 awsau-redis-bruteforce-ip-list-2021-09-03 bruteforce-ip-list-2022-04-02 awsindia-redis-bruteforce-ip-list-2022-05-19 vultrmadrid-ssh-bruteforce-ip-list-2022-08-17 anonymous-proxy-ip-list-2023-05-24 awsindia-mssql-bruteforce-ip-list-2022-05-21 doamsterdam-telnet-bruteforce-ip-list-2023-02-06 dobengaluru-telnet-bruteforce-ip-list-2023-03-17 vultrwarsaw-ssh-bruteforce-ip-list-2023-01-13 dofrank-ssh-bruteforce-ip-list-2023-02-24 forum-spam-ip-list-2023-02-14 aws-ssh-bruteforce-ip-list-2021-02-05 bruteforce-ip-list-2021-03-14 bruteforce-ip-list-2021-09-12 awsjap-redis-bruteforce-ip-list-2022-03-31 dotoronto-telnet-bruteforce-ip-list-2022-05-04 anonymous-proxy-ip-list-2023-05-21 dofrank-ssh-bruteforce-ip-list-2022-07-19 dotoronto-ssh-bruteforce-ip-list-2023-06-01 doamsterdam-telnet-bruteforce-ip-list-2022-08-08 dofrank-telnet-bruteforce-ip-list-2022-10-05 roxy-ip-list-2023-05-05 dotoronto-telnet-bruteforce-ip-list-2023-03-07 dotoronto-ssh-bruteforce-ip-list-2023-02-11 bruteforce-files-list-2020-08-08 aws-telnet-bruteforce-ip-list-2021-03-21 awsjap-redis-bruteforce-ip-list-2022-03-02 dobengaluru-telnet-bruteforce-ip-list-2022-07-15 vultrmadrid-telnet-bruteforce-ip-list-2022-07-22 dolondon-telnet-bruteforce-ip-list-2022-11-10 anonymous-proxy-ip-list-2023-05-22 dosing-telnet-bruteforce-ip-list-2023-05-25 dolondon-ssh-bruteforce-ip-list-2023-05-31 awsau-mssql-bruteforce-ip-list-2020-08-09 bruteforce-ip-list-2020-01-31 dofrank-telnet-bruteforce-ip-list-2023-02-16 dolondon-telnet-bruteforce-ip-list-2022-07-09 dosing-telnet-bruteforce-ip-list-2023-05-08 forum-spam-ip-list-2022-11-26 dobengaluru-telnet-bruteforce-ip-list-2023-03-14 dolondon-telnet-bruteforce-ip-list-2023-03-17 dolondon-telnet-bruteforce-ip-list-2023-02-21 bruteforce-ip-list-2021-01-24 telnet-bruteforce-ip-list-2021-09-10 awsjap-redis-bruteforce-ip-list-2022-03-16 awsjap-redis-bruteforce-ip-list-2022-03-22 dofrank-telnet-bruteforce-ip-list-2022-07-05 vultrmadrid-ssh-bruteforce-ip-list-2022-08-25 anonymous-proxy-ip-list-2023-05-23 dotoronto-ssh-bruteforce-ip-list-2023-06-07 bruteforce-ip-list-2020-08-28 bruteforce-files-list-2021-01-20 dofrank-mssql-bruteforce-ip-list-2021-03-20 bruteforce-ip-list-2021-06-23 dotoronto-telnet-bruteforce-ip-list-2021-10-26 awsjap-redis-bruteforce-ip-list-2022-02-08 awsjap-redis-bruteforce-ip-list-2022-05-16 nmap-scanning-list-2022-07-12