45.61.186.108 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Known Malicious Host 🔴 100/100

Host and Network Information

  • Mitre ATT&CK IDs: T1001 - Data Obfuscation, T1003 - OS Credential Dumping, T1005 - Data from Local System, T1007 - System Service Discovery, T1012 - Query Registry, T1016 - System Network Configuration Discovery, T1018 - Remote System Discovery, T1021 - Remote Services, T1027 - Obfuscated Files or Information, T1029 - Scheduled Transfer, T1030 - Data Transfer Size Limits, T1046 - Network Service Scanning, T1047 - Windows Management Instrumentation, T1049 - System Network Connections Discovery, T1055 - Process Injection, T1056 - Input Capture, T1057 - Process Discovery, T1059 - Command and Scripting Interpreter, T1068 - Exploitation for Privilege Escalation, T1069 - Permission Groups Discovery, T1070 - Indicator Removal on Host, T1071 - Application Layer Protocol, T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1087 - Account Discovery, T1090 - Proxy, T1095 - Non-Application Layer Protocol, T1105 - Ingress Tool Transfer, T1106 - Native API, T1112 - Modify Registry, T1113 - Screen Capture, T1132 - Data Encoding, T1134 - Access Token Manipulation, T1135 - Network Share Discovery, T1137 - Office Application Startup, T1140 - Deobfuscate/Decode Files or Information, T1185 - Man in the Browser, T1197 - BITS Jobs, T1203 - Exploitation for Client Execution, T1218 - Signed Binary Proxy Execution, T1518 - Software Discovery, T1543 - Create or Modify System Process, T1548 - Abuse Elevation Control Mechanism, T1550 - Use Alternate Authentication Material, T1553 - Subvert Trust Controls, T1562 - Impair Defenses, TA0011 - Command and Control
  • Tags: Cobalt Strike, Nextray, SSH, Telnet, advertising c, alibab, attack, buil, cobalt strike, cobaltstrike, computer syst, cyber security, digitaloceanasn, discovery, drbra, dumping, fecha, golpe, hachs sha256, huawei cloud, huelga, ioc, kfsensor, login, malicious, manipulation, os credential, phishing, rdp, scanner, service, ssh, system service, t1001, t1003, t1005, t1007, t1012, t1016, tipo firma
  • Known tor exit node
  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: blocklist_net_ua, botscout_30d, botscout_7d, dm_tor, et_tor, haley_ssh, stopforumspam, stopforumspam_180d, stopforumspam_30d, stopforumspam_365d, stopforumspam_7d, stopforumspam_90d, tor_exits, tor_exits_1d, tor_exits_30d, tor_exits_7d

  • Known TOR node
  • Country: United States of America
  • Network: AS53667 frantech solutions
  • Noticed: 50 times
  • Protcols Attacked: SSH
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America

Malware Detected on Host

Count: 21 2fd353ffcace535b5c0cdd3b70784bcbf1d4e35879a3109ed8825c2f970d22d3 7282e2fdb25b07554b082f5cf1697315ed5ce3005f985cbe96a34da965869db5 2b7efc8851f0f6c973347e4ea6ba40071c5c08fdeb23bfd27cadd1f69f99b510 ec43e150012d049bbdf9a552c9a466482c628db8b981064584998a97d2662914 f3000d56afe77e0d95335f7ea86562b3c0e598c1c66ecd4d62e5ccc8af6569d3 e746ba510b706bc06b084ce84d6cd7e417137efde85bf12e421fdf21fd677943 e7711425a3037a9b4a805b185c9096b2db65a523f07c8f908ab89d1da37370b7 25837be752586ccedb7da8ab32d563a7baa799d91ca69067f0b8acc14dfc0923 175947117e7dfbe4d0b437034d850cb8bb063038d1b1ab0219c56ddc6464b395 5ec5871b702ab135831503398816c6d1572c3371c48531dc3ffee82c4562dc4e

Open Ports Detected

22 4433

CVEs Detected

CVE-2016-20012 CVE-2017-15906 CVE-2018-15473 CVE-2018-15919 CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-14145 CVE-2020-15778 CVE-2021-36368 CVE-2021-41617

Map

Whois Information

  • NetRange: 45.61.128.0 - 45.61.191.255
  • CIDR: 45.61.128.0/18
  • NetName: PONYNET-15
  • NetHandle: NET-45-61-128-0-1
  • Parent: NET45 (NET-45-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS53667
  • Organization: FranTech Solutions (SYNDI-5)
  • RegDate: 2015-01-02
  • Updated: 2015-01-02
  • Ref: https://rdap.arin.net/registry/ip/45.61.128.0
  • OrgName: FranTech Solutions
  • OrgId: SYNDI-5
  • Address: 1621 Central Ave
  • City: Cheyenne
  • StateProv: WY
  • PostalCode: 82001
  • Country: US
  • RegDate: 2010-07-21
  • Updated: 2017-01-28
  • Ref: https://rdap.arin.net/registry/entity/SYNDI-5
  • OrgTechHandle: FDI19-ARIN
  • OrgTechName: Dias, Francisco
  • OrgTechPhone: +1-778-977-8246
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/FDI19-ARIN
  • OrgAbuseHandle: FDI19-ARIN
  • OrgAbuseName: Dias, Francisco
  • OrgAbusePhone: +1-778-977-8246
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/FDI19-ARIN

Links to attack logs

bruteforce-ip-list-2021-12-22