45.137.21.9 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 45.137.21.9 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 45/100

Host and Network Information

  • Mitre ATT&CK IDs: T1055 - Process Injection, T1059 - Command and Scripting Interpreter, T1562 - Impair Defenses, T1566 - Phishing
  • Tags: 0-day, Bot, CVE-2021-44228, Exploit, IOC, Malware, Nextray, alpha strike, anna paula, apache, apache log4j, april, aravinda, associated, august, ave maria, badrequest, billgates, blocklist, bruteforce, c2 host, cia triad, cobaltstrike, coinminer, company, contabo gmbh, contact, copy, curatedintel, curl, currc3adculo, cve-2021-44228, cve202144228, cyber security, date, digitaloceanasn, domain, domains, elknot, elknot intel, exploit, february, feed, feed log4jci, filehashmd5, filehashsha1, filehashsha256, filename hash, filename sha256, files, from email, germany, github, gmbh, hash, hashes, headers, hetzner online, high, host, how to, http, hybrid analysis, hydra, iiop, indonesia, ioc, ioc feed, ipaddress, ips url, ipv4s context, january, jump, june, kinsing, kinsing miner, labs gmbh, ldap, level3, linode, log4j, log4j azure, log4j craiu, log4j crowdsec, log4j exploit, log4j greynoise, log4j threatfox, log4j throwing, log4j urlhaus, log4jci, log4jci log4jci, log4shell, log4shelliocs, malicious, malspam email, md5 hashes, md5=29851d65fe14699a793bf401cb84c019, mirai, monero miner, msi file, mushtik, mushtik botnet, netherlands, new jersey, open source, orcus, orcusrat, orcusrat zip, ovh sas, phishing, ponynet, port, port>) bash, powershell, probing, public, rce attempt, remote code, scanner ip, scanning, security llc, sentinel ioc, service, sha256, shenal, show, sign, star, strong, sysv, telecom, tips, tuesday, ukraine, united, unknown ip, urls, urls http, utf8, varspoolcron, virustotal, w hidden, webscan, webscanner, webscanner bruteforce web app attack, x x86, x x8664, x x86g, x41me m3wtf, your files, zip archive
  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: turris_greylist

  • Country: Netherlands
  • Network: AS51447 rootlayer web services ltd.
  • Noticed: 1 times
  • Protcols Attacked: ntp snmp
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Open Ports Detected

80

Map

Whois Information

  • inetnum: 45.137.20.0 - 45.137.23.255
  • netname: BD-ROOTLAYER-20190805
  • country: NL
  • geoloc: 52.0016466 4.2070152
  • language: NL
  • language: EN
  • org: ORG-RWSL1-RIPE
  • admin-c: KBA20-RIPE
  • tech-c: KBA20-RIPE
  • status: ALLOCATED PA
  • mnt-by: ROOTLAYERNET
  • mnt-by: RIPE-NCC-HM-MNT
  • created: 2021-11-15T14:14:10Z
  • last-modified: 2021-12-28T10:13:33Z
  • organisation: ORG-RWSL1-RIPE
  • org-name: RootLayer Web Services Ltd.
  • country: BD
  • org-type: LIR
  • address: 134/7 B, Furfura Sharif Road, Darus Salam, Mirpur, Dhaka
  • address: 1216
  • address: Dhaka
  • address: BANGLADESH
  • phone: +8801932973247
  • admin-c: KBA20-RIPE
  • tech-c: KBA20-RIPE
  • abuse-c: AR43110-RIPE
  • mnt-ref: ROOTLAYERNET
  • mnt-by: RIPE-NCC-HM-MNT
  • mnt-by: ROOTLAYERNET
  • created: 2017-09-18T13:04:41Z
  • last-modified: 2021-11-11T13:33:57Z
  • person: K.M. Badrul Alam
  • address: Naherins Domain, 134/7 B, Furfura Sharif Road, Darus Salam
  • address: 1216
  • address: Dhaka
  • address: BANGLADESH
  • phone: +8801932973247
  • nic-hdl: KBA20-RIPE
  • mnt-by: bd-rootlayer-1-mnt
  • created: 2017-09-18T13:04:41Z
  • last-modified: 2017-09-18T13:04:41Z
  • route: 45.137.21.0/24
  • origin: AS51447
  • mnt-by: bd-rootlayer-1-mnt
  • mnt-by: ROOTLAYERNET
  • created: 2019-12-18T16:26:18Z
  • last-modified: 2019-12-18T16:26:18Z

Links to attack logs

ntp-bruteforce-ip-list-2022-07-06 dotoronto-snmp-bruteforce-ip-list-2022-07-10 doamsterdam-snmp-bruteforce-ip-list-2022-06-22 dofrank-snmp-bruteforce-ip-list-2022-07-10 vultrparis-snmp-bruteforce-ip-list-2022-06-09 awsjap-ntp-bruteforce-ip-list-2022-04-16 ntp-bruteforce-ip-list-2022-06-22 vultrparis-snmp-bruteforce-ip-list-2022-06-22 vultrparis-snmp-bruteforce-ip-list-2022-07-10 ntp-bruteforce-ip-list-2021-09-22 ntp-bruteforce-ip-list-2022-07-02 ntp-bruteforce-ip-list-2022-07-10 dosing-snmp-bruteforce-ip-list-2022-07-10 dofrank-snmp-bruteforce-ip-list-2022-06-22 doamsterdam-snmp-bruteforce-ip-list-2022-07-10 awsindia-ntp-bruteforce-ip-list-2022-04-16 vultrmadrid-snmp-bruteforce-ip-list-2022-06-22 dolondon-snmp-bruteforce-ip-list-2022-07-10 vultrmadrid-snmp-bruteforce-ip-list-2022-07-10 dotoronto-snmp-bruteforce-ip-list-2022-06-09 vultrwarsaw-snmp-bruteforce-ip-list-2022-06-22 ntp-bruteforce-ip-list-2022-07-17 vultrwarsaw-snmp-bruteforce-ip-list-2022-07-10 dobengaluru-snmp-bruteforce-ip-list-2022-06-22 snmp-bruteforce-ip-list-2022-06-22 snmp-bruteforce-ip-list-2022-07-10 dolondon-snmp-bruteforce-ip-list-2022-06-09 dosing-snmp-bruteforce-ip-list-2022-06-09 awsbah-ntp-bruteforce-ip-list-2022-04-16 dolondon-snmp-bruteforce-ip-list-2022-06-22 dosing-snmp-bruteforce-ip-list-2022-06-22 ntp-bruteforce-ip-list-2022-07-09 dobengaluru-snmp-bruteforce-ip-list-2022-07-10 awssafrica-ntp-bruteforce-ip-list-2022-06-09 awssafrica-snmp-bruteforce-ip-list-2022-06-09 dofrank-snmp-bruteforce-ip-list-2022-06-09 ntp-bruteforce-ip-list-2022-06-14 dotoronto-snmp-bruteforce-ip-list-2022-06-22