45.148.10.93 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 45.148.10.93 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 30/100

Host and Network Information

  • Mitre ATT&CK IDs: T1110 - Brute Force
  • Tags: Nextray, SSH, Telnet, brazil, brute-force, bruteforce, canada, china, cyber security, france, germany, group, india, ioc, italy, japan, korea, malicious, mexico, mothership, phishing, poland, singapore, spain, ssh, ssh bruteforce, switzerland, taiwan, tcp, tsec
  • View other sources: Spamhaus VirusTotal

  • Country: Netherlands
  • Network: AS48090 pptechnology limited
  • Noticed: 1 times
  • Protcols Attacked: SSH
  • Countries Attacked: Australia, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: xyro.xyz

Malware Detected on Host

Count: 7 155ed68d5aa2c3fde5479f777459bcb9c546e0ecaf4631675afdad47b7ddd534 ed900e8b42be722942750f3d69727b471942065d174fa90bf054aa510850345a b19bbc008de29d3d5670ce6cdba7685acddf68043492e9a67d69cd8780d47268 a9923bdc53c41600eddea1e5fad3633aeaab978c58e2566f09e2a4db9b1ce70b d1fa8830c3f3b0143c181d3e2a6ffb654de128636dcd76103f6bca053aba4080 4c295064342e1537bd6acb083e2a017a532344d81d54ed3ae5852b7fe8523f94 cebfe6188e9fb950505a6b52a978cdfaa0522d47e15f67a89cfe752e26ba4172

Map

Whois Information

  • inetnum: 45.148.10.0 - 45.148.10.255
  • org: ORG-PA1232-RIPE
  • mnt-domains: CYBR-DMZ
  • mnt-domains: CYBR-DMZ
  • netname: DMZHOST-LIMITED
  • descr: https://dmzhost.co
  • country: AD
  • admin-c: ACRO26775-RIPE
  • tech-c: ACRO26775-RIPE
  • status: ASSIGNED PA
  • mnt-by: CYBR-DMZ
  • mnt-by: pptechnology
  • created: 2019-09-02T15:08:45Z
  • last-modified: 2022-12-21T16:42:05Z
  • organisation: ORG-PA1232-RIPE
  • org-name: PPTECHNOLOGY LIMITED
  • country: GB
  • org-type: OTHER
  • address: 35 Firs Avenue, London, England, N11 3NE
  • abuse-c: ACRO26775-RIPE
  • mnt-ref: pptechnology
  • mnt-by: pptechnology
  • created: 2019-09-02T14:59:13Z
  • last-modified: 2022-12-01T17:22:22Z
  • role: Abuse contact role object
  • address: 35 Firs Avenue, London, England, N11 3NE
  • abuse-mailbox: [email protected]
  • nic-hdl: ACRO26775-RIPE
  • mnt-by: pptechnology
  • created: 2019-09-02T14:58:45Z
  • last-modified: 2022-10-03T17:04:32Z
  • route: 45.148.10.0/24
  • origin: AS48090
  • mnt-by: CYBR-DMZ
  • created: 2019-09-05T14:32:45Z
  • last-modified: 2019-09-21T13:21:51Z

Links to attack logs

bruteforce-ip-list-2020-02-07