64.227.118.85 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 64.227.118.85 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Likely Malicious Host 🟠 55/100

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110.004 - Credential Stuffing, T1110 - Brute Force
  • Tags: 0xBFKX, brute force, bruteforce, Bruteforce, Brute-Force, cowrie, fail2ban, ssh, SSH
  • JARM: 28d28d28d00028d00042d42d000000d6376f1d8fe64877806a85a008c1c790

  • View other sources: Spamhaus VirusTotal

  • Country: Germany
  • Network: AS14061 digitalocean llc
  • Noticed: 1 times
  • Protcols Attacked: ssh
  • Countries Attacked: Australia
  • Passive DNS Results: elalwaneldawlya.com www.elalwaneldawlya.com sp-today.cc

Open Ports Detected

22 443 80

CVEs Detected

CVE-2018-19296 CVE-2019-16780 CVE-2019-16781 CVE-2019-20041 CVE-2019-20042 CVE-2019-20043 CVE-2020-11025 CVE-2020-11026 CVE-2020-11027 CVE-2020-11028 CVE-2020-11029 CVE-2020-11030 CVE-2020-25286 CVE-2020-28032 CVE-2020-28033 CVE-2020-28034 CVE-2020-28035 CVE-2020-28036 CVE-2020-28037 CVE-2020-28038 CVE-2020-28039 CVE-2020-28040 CVE-2020-36326 CVE-2020-4046 CVE-2020-4047 CVE-2020-4048 CVE-2020-4049 CVE-2020-4050 CVE-2021-23017 CVE-2021-29450 CVE-2021-3618 CVE-2021-39200 CVE-2021-39201 CVE-2021-44223 CVE-2022-21661 CVE-2022-21662 CVE-2022-21663 CVE-2022-21664 CVE-2022-3590 CVE-2022-43497 CVE-2022-43500 CVE-2022-43504 CVE-2023-22622 CVE-2023-2745

Map

Whois Information

  • NetRange: 64.227.0.0 - 64.227.127.255
  • CIDR: 64.227.0.0/17
  • NetName: DIGITALOCEAN-64-227-0-0
  • NetHandle: NET-64-227-0-0-2
  • Parent: NET64 (NET-64-0-0-0-0)
  • NetType: Direct Allocation
  • OriginAS: AS14061
  • Organization: DigitalOcean, LLC (DO-13)
  • RegDate: 2019-08-14
  • Updated: 2020-04-03
  • Comment: Routing and Peering Policy can be found at https://www.as14061.net
  • Comment:
  • Ref: https://rdap.arin.net/registry/ip/64.227.0.0
  • OrgName: DigitalOcean, LLC
  • OrgId: DO-13
  • Address: 101 Ave of the Americas
  • Address: FL2
  • City: New York
  • StateProv: NY
  • PostalCode: 10013
  • Country: US
  • RegDate: 2012-05-14
  • Updated: 2023-10-23
  • Ref: https://rdap.arin.net/registry/entity/DO-13
  • OrgTechHandle: NOC32014-ARIN
  • OrgTechName: Network Operations Center
  • OrgTechPhone: +1-347-875-6044
  • OrgTechEmail: [email protected]
  • OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
  • OrgAbuseHandle: ABUSE5232-ARIN
  • OrgAbuseName: Abuse, DigitalOcean
  • OrgAbusePhone: +1-347-875-6044
  • OrgAbuseEmail: [email protected]
  • OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5232-ARIN
  • OrgNOCHandle: NOC32014-ARIN
  • OrgNOCName: Network Operations Center
  • OrgNOCPhone: +1-347-875-6044
  • OrgNOCEmail: [email protected]
  • OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN

Links to attack logs

digitaloceansingapore-ssh-bruteforce-ip-list-2023-11-27 vultrparis-ssh-bruteforce-ip-list-2023-11-27