46.246.84.13 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 46.246.84.13 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 50/100

Host and Network Information

  • Mitre ATT&CK IDs: T1027 - Obfuscated Files or Information, T1053 - Scheduled Task/Job, T1055 - Process Injection, T1104 - Multi-Stage Channels, T1106 - Native API, T1547 - Boot or Logon Autostart Execution, T1559 - Inter-Process Communication
  • Tags: aggah, aptc36, asyncrat, c-36, class, december, download, explorer, february, first, fsociety, hagga, hollowing, limerat, next, njrat, ole object, rats, regasm process, tools

  • View other sources: Spamhaus VirusTotal

  • Country: Sweden
  • Network: AS42708 glesys ab
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy
  • Passive DNS Results: septiembre2022.duckdns.org matarife.duckdns.org spamworzon.duckdns.org morelogs22.sytes.net wshlynh.ddns.net daddy.linkpc.net nuevosecua.duckdns.org nuevosremcs.duckdns.org navidad202223.duckdns.org capurgana.duckdns.org upgrade1linkedin.ddns.net windrv.ddns.net server.freedynamicdns.org connectionservices.sytes.net cj26.ddns.net microsoftnet1.hopto.org newcracker.duckdns.org mansengco778.ddns.net asy1543.duckdns.org mr1963.duckdns.org diosamor27.duckdns.org reald27.duckdns.org kinosoft.hopto.org androidmedallo.duckdns.org ant-ec.duckdns.org proxy21.duckdns.org ecuadordos.duckdns.org ecuado2021.duckdns.org lana2000.direct.quickconnect.to

Malware Detected on Host

Count: 3 bd989528e2c4ca64c6dfa437d1ba34e3eea0877e540bef8e7fd8c96b3ec17126 6802c19079c21a985288ad3e2bae4881ca3314037711a1427f6b461598833143 353ad7e6e97a800ae060d31a617ca1fe686c196cf19218d8eebe34e6f8f6cc2e

Open Ports Detected

111 137 32400 443 55443 6379 8000 8009

Map

Whois Information

  • inetnum: 46.246.0.0 - 46.246.127.255
  • geofeed: https://as42708.net/geofeed.csv
  • netname: SE-GLE-RIPE-20110127
  • country: SE
  • org: ORG-GISA2-RIPE
  • admin-c: GLE-RIPE
  • tech-c: GLE-RIPE
  • status: ALLOCATED PA
  • mnt-by: GLESYS-MNT
  • mnt-by: RIPE-NCC-HM-MNT
  • created: 2019-02-07T10:02:28Z
  • last-modified: 2023-07-03T07:21:12Z
  • organisation: ORG-GISA2-RIPE
  • org-name: GleSYS AB
  • country: SE
  • org-type: LIR
  • address: Kanslistvägen 12
  • address: S-31139
  • address: Falkenberg
  • address: SWEDEN
  • phone: +4634649395
  • fax-no: +4634658445
  • abuse-c: GLE101-RIPE
  • mnt-ref: RIPE-NCC-HM-MNT
  • mnt-ref: GLESYS-MNT
  • mnt-by: RIPE-NCC-HM-MNT
  • mnt-by: GLESYS-MNT
  • created: 2007-11-06T11:11:44Z
  • last-modified: 2023-10-16T07:37:42Z
  • person: GleSYS Support
  • address: Box 134
  • address: 31122 Falkenberg
  • address: Sweden
  • phone: +46-346-738800
  • nic-hdl: GLE-RIPE
  • mnt-by: GLESYS-MNT
  • created: 2007-09-20T12:07:40Z
  • last-modified: 2010-05-28T04:24:21Z
  • route: 46.246.0.0/17
  • descr: Portlane Network
  • origin: AS42708
  • mnt-by: MNT-PORTLANE
  • mnt-by: GLESYS-MNT
  • created: 2011-01-27T13:42:49Z
  • last-modified: 2023-09-29T11:44:42Z

Links to attack logs

anonymous-proxy-ip-list-2023-11-23