54.198.154.165 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 54.198.154.165 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Possibly Malicious Host 🟢 15/100

Host and Network Information

  • View other sources: Spamhaus VirusTotal

  • Country: United States
  • Network: AS14618 amazon.com inc.
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy

Open Ports Detected

10000 10001 10134 10243 10250 10443 10554 11000 11300 11371 12000 1337 14147 14265 14344 16992 16993 17000 18081 18245 19000 19071 20000 3128 3129 3200 3211 3221 3260 3268 3269 3270 3299 3301 3310 3333 3337 3352 3389 3400 3401 3402 3403 3407 3443 3498 3521 3522 3523 3541 3542 3548 3549 3551 3556 3557 3558 3559 3560 3562 3563 3689 3690 3780 3790 3791 3792 3838 3910 3922 3951 4040 4043 4063 4064 4117 4118 4190 4200 4242 4282 4321 4430 4433 4443 4444 4482 4506 4524 4567 4643 4646 4664 4782 4786 4808 4840 4899 4911 5001 5002 5004 5005 5006 5007 5009 5010 5025 5050 5070 5080 5090 5172 5190 5201 5209 5280 5321 5357 5432 5446 5454 5555 5560 5567 5569 5591 5594 5595 5598 5599 5601 5602 5607 5608 5672 5673 5800 5801 5822 5900 5901 5907 5908 5909 5910 5938 5984 5985 5986 6000 6002 6003 6004 6006 6008 6036 6080 6102 6264 6308 6379 6443 6464 6510 6512 6550 6565 6580 6581 6588 6590 6600 6602 6603 6605 6622 6633 6662 6664 6668 6697 6748 7001 7002 7003 7004 7005 7014 7071 7080 7081 7090 7170 7218 7415 7433 7443 7465 7474 7493 7500 7547 7548 7634 7657 7676 7776 7777 7779 7887 7989 7998 80 8000 8001 8003 8004 8006 8008 8009 8010 8011 8015 8016 8018 8019 8020 8022 8025 8028 8029 8030 8032 8036 8038 8039 8040 8041 8044 8045 8047 8049 8052 8054 8055 8057 8060 8064 8069 8071 8072 8080 8083 8087 8090 8095 8096 8097 8099 8100 8101 8102 8103 8106 8107 8108 8110 8118 8140 8159 8184 8200 8236 8239 8241 8243 8251 8252 8291 8333 8408 8411 8415 8421 8422 8423 8425 8426 8427 8430 8442 8443 8445 8448 8500 8513 8545 8553 8554 8575 8585 8590 8602 8621 8623 8649 8686 8733 8766 8779 8782 8784 8787 8800 8802 8809 8813 8815 8816 8818 8821 8824 8826 8828 8831 8833 8834 8836 8837 8838 8839 8840 8843 8847 8849 8854 8855 8857 8858 8859 8863 8864 8865 8866 8868 8869 8872 8875 8877 8878 8881 8885 8888 8889 8890 8891 8935 8969 8989 8990 8991 8993 9000 9001 9002 9003 9004 9006 9008 9009 9012 9013 9019 9021 9022 9024 9025 9026 9027 9028 9031 9032 9033 9034 9035 9036 9037 9038 9039 9040 9043 9044 9046 9048 9051 9070 9084 9088 9090 9091 9092 9093 9094 9095 9098 9100 9103 9104 9106 9107 9108 9109 9136 9151 9160 9191 9200 9201 9202 9204 9205 9207 9209 9210 9217 9220 9222 9251 9295 9299 9300 9304 9306 9307 9310 9389 9433 9443 9445 9527 9530 9550 9595 9600 9663 9682 9690 9704 9765 9800 9869 9898 9899 9955 9981 9988 9991 9993 9997 9998 9999

CVEs Detected

CVE-2019-12519 CVE-2019-12520 CVE-2019-12521 CVE-2019-12522 CVE-2019-12523 CVE-2019-12524 CVE-2019-12525 CVE-2019-12526 CVE-2019-12527 CVE-2019-12528 CVE-2019-12529 CVE-2019-12854 CVE-2019-13345 CVE-2019-18676 CVE-2019-18677 CVE-2019-18678 CVE-2019-18679 CVE-2019-18860 CVE-2020-11945 CVE-2020-14058 CVE-2020-15049 CVE-2020-15810 CVE-2020-15811 CVE-2020-24606 CVE-2020-25097 CVE-2020-8449 CVE-2020-8450 CVE-2020-8517 CVE-2021-28116 CVE-2021-28651 CVE-2021-28652 CVE-2021-28662 CVE-2021-31806 CVE-2021-31807 CVE-2021-31808 CVE-2021-33620 CVE-2021-46784 CVE-2022-41318

Map

Whois Information

  • NetRange: 54.144.0.0 - 54.221.255.255
  • CIDR: 54.208.0.0/13, 54.144.0.0/12, 54.220.0.0/15, 54.216.0.0/14, 54.160.0.0/11, 54.192.0.0/12
  • NetName: AMAZON
  • NetHandle: NET-54-144-0-0-1
  • Parent: NET54 (NET-54-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS:
  • Organization: Amazon Technologies Inc. (AT-88-Z)
  • RegDate: 2014-10-23
  • Updated: 2021-02-10
  • Ref: https://rdap.arin.net/registry/ip/54.144.0.0
  • OrgName: Amazon Technologies Inc.
  • OrgId: AT-88-Z
  • Address: 410 Terry Ave N.
  • City: Seattle
  • StateProv: WA
  • PostalCode: 98109
  • Country: US
  • RegDate: 2011-12-08
  • Updated: 2022-09-30
  • Comment: All abuse reports MUST include:
  • Comment: * src IP
  • Comment: * dest IP (your IP)
  • Comment: * dest port
  • Comment: * Accurate date/timestamp and timezone of activity
  • Comment: * Intensity/frequency (short log extracts)
  • Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
  • Ref: https://rdap.arin.net/registry/entity/AT-88-Z
  • OrgRoutingHandle: IPROU3-ARIN
  • OrgRoutingName: IP Routing
  • OrgRoutingPhone: +1-206-555-0000
  • OrgRoutingEmail: [email protected]
  • OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
  • OrgAbuseHandle: AEA8-ARIN
  • OrgAbuseName: Amazon EC2 Abuse
  • OrgAbusePhone: +1-206-555-0000
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
  • OrgNOCHandle: AANO1-ARIN
  • OrgNOCName: Amazon AWS Network Operations
  • OrgNOCPhone: +1-206-555-0000
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
  • OrgTechHandle: ANO24-ARIN
  • OrgTechName: Amazon EC2 Network Operations
  • OrgTechPhone: +1-206-555-0000
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
  • OrgRoutingHandle: ARMP-ARIN
  • OrgRoutingName: AWS RPKI Management POC
  • OrgRoutingPhone: +1-206-555-0000
  • OrgRoutingEmail: [email protected]
  • OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
  • NetRange: 54.198.0.0 - 54.198.255.255
  • CIDR: 54.198.0.0/16
  • NetName: AMAZON-IAD
  • NetHandle: NET-54-198-0-0-1
  • Parent: AMAZON (NET-54-144-0-0-1)
  • NetType: Reallocated
  • OriginAS:
  • Organization: Amazon Data Services NoVa (ADSN-1)
  • RegDate: 2020-04-16
  • Updated: 2021-02-10
  • Ref: https://rdap.arin.net/registry/ip/54.198.0.0
  • OrgName: Amazon Data Services NoVa
  • OrgId: ADSN-1
  • Address: 13200 Woodland Park Road
  • City: Herndon
  • StateProv: VA
  • PostalCode: 20171
  • Country: US
  • RegDate: 2018-04-25
  • Updated: 2019-08-02
  • Ref: https://rdap.arin.net/registry/entity/ADSN-1
  • OrgNOCHandle: AANO1-ARIN
  • OrgNOCName: Amazon AWS Network Operations
  • OrgNOCPhone: +1-206-555-0000
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
  • OrgAbuseHandle: AEA8-ARIN
  • OrgAbuseName: Amazon EC2 Abuse
  • OrgAbusePhone: +1-206-555-0000
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
  • OrgTechHandle: ANO24-ARIN
  • OrgTechName: Amazon EC2 Network Operations
  • OrgTechPhone: +1-206-555-0000
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN

Links to attack logs

anonymous-proxy-ip-list-2023-07-08