80.66.75.4 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 80.66.75.4 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Likely Malicious Host 🟠 60/100

Host and Network Information

  • Mitre ATT&CK IDs: T1003 - OS Credential Dumping, T1005 - Data from Local System, T1008 - Fallback Channels, T1011 - Exfiltration Over Other Network Medium, T1016 - System Network Configuration Discovery, T1025 - Data from Removable Media, T1027 - Obfuscated Files or Information, T1036 - Masquerading, T1048 - Exfiltration Over Alternative Protocol, T1049 - System Network Connections Discovery, T1053 - Scheduled Task/Job, T1055 - Process Injection, T1056 - Input Capture, T1057 - Process Discovery, T1059 - Command and Scripting Interpreter, T1071 - Application Layer Protocol, T1082 - System Information Discovery, T1083 - File and Directory Discovery, T1087 - Account Discovery, T1091 - Replication Through Removable Media, T1092 - Communication Through Removable Media, T1095 - Non-Application Layer Protocol, T1098 - Account Manipulation, T1102 - Web Service, T1105 - Ingress Tool Transfer, T1112 - Modify Registry, T1114 - Email Collection, T1119 - Automated Collection, T1176 - Browser Extensions, T1202 - Indirect Command Execution, T1203 - Exploitation for Client Execution, T1217 - Browser Bookmark Discovery, T1219 - Remote Access Software, T1486 - Data Encrypted for Impact, T1489 - Service Stop, T1490 - Inhibit System Recovery, T1497 - Virtualization/Sandbox Evasion, T1518 - Software Discovery, T1539 - Steal Web Session Cookie, T1543 - Create or Modify System Process, T1546 - Event Triggered Execution, T1547 - Boot or Logon Autostart Execution, T1548 - Abuse Elevation Control Mechanism, T1552 - Unsecured Credentials, T1553 - Subvert Trust Controls, T1555 - Credentials from Password Stores, T1560 - Archive Collected Data, T1562 - Impair Defenses, T1564 - Hide Artifacts, T1566 - Phishing, T1568 - Dynamic Resolution, T1569 - System Services, T1571 - Non-Standard Port, T1574 - Hijack Execution Flow, T1613 - Container and Resource Discovery
  • Tags: addresses, appdata, asprox, bifrost, bitcoin, bladabindi, center, cerber, collections, compromise iocs, compromiseiocs, connections, connections ip, contacted, contacted urls, darkcomet, defender, domain names, dropper, email security, emotet, endpoint na, endpoint secure, eternalblue, execution, express, file hashes, files, gh0strat, glupteba, hashessee json, historical ssl, httphttps, ioc searching, iocs, json, json file, kovter, kuluoz, leave, linkid104288, local, lokibot, main, march, microsoft word, mitre att, na secure, na stealthwatch, netwire, occurrences ip, phorpiex, python, qbot, ramnit, rats, registry keys, see json, service, shardbypasssd, shell, skynet project, ssl certificate, stealthwatch na, system32, t1027, ta0002, ta0003, ta0004, ta0005, ta0007, ta0011, talos, temp, teslacrypt, threat roundup, tinba, tofsee, tools, trojan, upatre, urls collection, ursu, whois, whois record, windows, zusy

  • View other sources: Spamhaus VirusTotal

  • Country: Russia
  • Network: ASNone
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy

Malware Detected on Host

Count: 668 26dfa9d69f183cbbaa8637dbf8eba7fadb78a6671f1bb06ef091c547c7020c6a 786ee5ea7faa9243b06323197030d7bf4d3974504059e842c8818f41b658bd8c 5664b429821207f1c58d85ae76463bd58e30ed7f5efbbd17c861639b53f2c98d 91aa6e0fd5cdd552cf41e62743b3b940927a1dca2e6d081c5b4afbb6d3d2e5b3 d63cea2857c3a744d5ecba8e6ec3817b0fa9edd59329a910c0d1e71df5c5d209 a1ae2b8aed2be51dfe11906ba66b4b9f528d7ee5bca4f27168cf5235117d25ea 8070d404549c2d4e3e7797209c1d84de33523229c278dc2a40f209e2f1524e05 69f3656979164f12e56c553429303c3626bda4f1b77b70e3dc9d1840177bbf96 b9b7dcc7618ece3076b16926eabc759a0847df72022cf24e240df62cca389bfa 0972c5fe056b5177006810acdfe81374d5a2003dd6223769e43caddc001cd808

Open Ports Detected

35000 37215 50000 51235 55442 60129 62078 9080

CVEs Detected

CVE-2006-20001 CVE-2013-4352 CVE-2013-5704 CVE-2013-6438 CVE-2014-0098 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2014-3523 CVE-2014-3581 CVE-2014-8109 CVE-2015-0228 CVE-2015-3183 CVE-2015-3184 CVE-2015-3185 CVE-2016-0736 CVE-2016-2161 CVE-2016-4975 CVE-2016-5387 CVE-2016-8612 CVE-2016-8743 CVE-2017-15710 CVE-2017-15715 CVE-2017-3167 CVE-2017-7679 CVE-2017-9788 CVE-2017-9798 CVE-2018-1283 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-1312 CVE-2018-17199 CVE-2019-0217 CVE-2019-0220 CVE-2019-10092 CVE-2019-10098 CVE-2019-17567 CVE-2020-11985 CVE-2020-13938 CVE-2020-1927 CVE-2020-1934 CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-34798 CVE-2021-39275 CVE-2021-40438 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 CVE-2022-26377 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31813 CVE-2022-36760 CVE-2022-37436 CVE-2023-25690

Map

Whois Information

  • inetnum: 80.66.75.0 - 80.66.75.255
  • netname: duwm-net
  • country: RU
  • org: ORG-DL550-RIPE
  • admin-c: DN4804-RIPE
  • tech-c: DN4804-RIPE
  • abuse-c: ACRO52056-RIPE
  • status: ASSIGNED PA
  • mnt-by: ru-avm-1-mnt
  • created: 2022-06-11T11:48:54Z
  • last-modified: 2023-03-10T11:30:29Z
  • organisation: ORG-DL550-RIPE
  • org-name: DUWM LLC
  • org-type: OTHER
  • address: 12700 Kyrgiz Republic Green str 1-50
  • abuse-c: ACRO52056-RIPE
  • mnt-ref: ru-avm-1-mnt
  • mnt-ref: FREENET-MNT
  • mnt-by: DUWM-MNT
  • created: 2023-03-10T08:59:17Z
  • last-modified: 2023-04-26T02:45:35Z
  • role: duwm noc
  • address: 12700 Kyrgiz Republic Green str 1-50
  • nic-hdl: DN4804-RIPE
  • mnt-by: DUWM-MNT
  • created: 2023-03-10T08:56:24Z
  • last-modified: 2023-03-10T08:56:24Z
  • route: 80.66.75.0/24
  • origin: AS211849
  • mnt-by: ru-avm-1-mnt
  • created: 2022-09-06T06:23:24Z
  • last-modified: 2022-09-06T06:23:24Z
  • route: 80.66.75.0/24
  • origin: AS35029
  • mnt-by: ru-avm-1-mnt
  • created: 2022-06-15T09:17:01Z
  • last-modified: 2022-06-15T09:17:01Z

Links to attack logs

anonymous-proxy-ip-list-2023-06-26