45.61.184.133 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Likely Malicious Host 🟠 67/100

Host and Network Information

  • Mitre ATT&CK IDs: T1110 - Brute Force, T1132 - Data Encoding, T1190 - Exploit Public-Facing Application, T1210 - Exploitation of Remote Services, T1498 - Network Denial of Service, TA0037 - Command and Control
  • Tags: Bruteforce, CVE-2021-35394, DNS, IoT, Malicious IP, Nextray, Port scan, Realtek Jungle SDK, RedGoBot, SSH, Skype, Telnet, anna paula, apache, associated, attack, august, badrequest, blacklist, botnet, bruteforce, canada, china, cowrie, currc3adculo, cve202135394, cyber security, czech republic, december, digital ocean, dnsserver, exploits, federation, figure, france, from email, gafgyt, germany, headers, hungary, icmp, india, ioc, login, malicious, malspam email, malware, malware/botnet, malware/gafgyt, malware/mirai, malware/redgobot, mirai, mozi, msi file, netherlands, november, palo alto, phishing, probing, scan, scanner, scanning, shell script, supply chain, tcp, technology/realteksdk, telnet, tuesday, udp, united, united kingdom, utf8, vietnam, vulnerability, vulnerability/cve-2021-35394, webscan, webscanner, webscanner bruteforce web app attack, wildfire, zip archive
  • View other sources: Spamhaus VirusTotal

  • Country: United States of America
  • Network: AS53667 frantech solutions
  • Noticed: 40 times
  • Protcols Attacked: telnet
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Malaysia, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: panelled.site

Malware Detected on Host

Count: 2 500693fb8dbc0c44fbe22d4f6c9c43cd8a1abec8c1d91e353bf1e98b4448d88c 500693fb8dbc0c44fbe22d4f6c9c43cd8a1abec8c1d91e353bf1e98b4448d88c

Open Ports Detected

10000 111 1311 1337 135 1400 1471 1599 1723 1741 175 1911 1925 1926 195 2000 2082 2086 2087 22 2345 2375 2376 2480 2761 2762 3000 3001 311 3128 3260 3299 3388 3389 3460 3541 3689 3749 3790 4040 4242 443 4433 444 4443 4567 4664 4786 4848 5000 5001 5005 5006 5009 5222 5269 53 5357 5555 5560 5601 5800 5900 5901 5985 5986 6080 631 6443 6664 6668 7001 7071 7415 7443 7474 7547 7657 7777 7779 7989 80 8000 8001 8008 8009 8060 8069 8080 8081 8083 8086 8089 81 8112 8139 8140 8181 82 8200 83 8334 84 8834 8888 8889 9000 9001 9002 9009 9080 9090 9091 9200 9295 9443 9595 9869 9943 9981 9999

CVEs Detected

CVE-2016-20012 CVE-2017-15906 CVE-2018-15473 CVE-2018-15919 CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-14145 CVE-2020-15778 CVE-2021-36368 CVE-2021-41617 CVE-2023-28531

Map

Links to attack logs

dofrank-telnet-bruteforce-ip-list-2022-08-14 doamsterdam-telnet-bruteforce-ip-list-2022-08-16 dotoronto-telnet-bruteforce-ip-list-2022-08-19 dobengaluru-telnet-bruteforce-ip-list-2022-08-16