80.67.172.162 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 80.67.172.162 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Known Malicious Host 🔴 80/100

Host and Network Information

  • Mitre ATT&CK IDs: T1027 - Obfuscated Files or Information, T1056.001 - Keylogging, T1059.007 - JavaScript, T1059 - Command and Scripting Interpreter, T1068 - Exploitation for Privilege Escalation, T1071.001 - Web Protocols, T1071.004 - DNS, T1071 - Application Layer Protocol, T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110.004 - Credential Stuffing, T1110 - Brute Force, T1114 - Email Collection, T1176 - Browser Extensions, T1491 - Defacement, T1497 - Virtualization/Sandbox Evasion, T1566 - Phishing, T1571 - Non-Standard Port, T1573 - Encrypted Channel, TA0011 - Command and Control
  • Tags: acint, agent, agent tesla, agenttesla, alexa, alexa top, all octoseek, appdata, apple, apple ios, artemis, as141773, as15169 google, as17506 arteria, as17806 mango, as19969, as32244 liquid, as49505, as61317, as63932, ascii text, asnone united, asyncrat, attack, azorult, bank, banker, bazaloader, bazarloader, beginstring, bitminer, blacklist, blacklist http, blacklist https, bladabindi, blockchain, body, bradesco, Bruteforce, Brute-Force, cisco umbrella, class, cleaner, click, cobalt strike, communicating, conduit, contacted, core, covid19, cowrie, crack, critical, cry kill, cve201711882, cyber security, cyberstalking, cyber threat, cymulate2, dapato, date, detection list, detplock, dllinject, domain, downldr, download, downloader, driverpack, dropped, dropper, emotet, encpk, encrypt, engineering, entries, error, et tor, exit, expired, facebook, fakeinstaller, falcon, fali contacted, fali malicious, file, files, filetour, formbook, fusioncore, general, generator, generic, generic malware, gmt content, gmt contenttype, hacktool, heur, hostname, hybrid, iframe, immediate, indicator, installcore, installer, installpack, internet storm, iobit, ioc, ip summary, ipv4, japan unknown, keep alive, keylogger, known tor, kraddare, kyriazhs1975, loadmoney, local, lockbit, login, look, malicious, malicious site, maltiverse, malvertizing, malware, malware norad, malware site, media, mediaget, meta, meterpreter, million, miner, mirai, misc attack, moved, msil, name verdict, nanocore, nanocore rat, netwire rc, networm, next, Nextray, njrat, node traffic, noname057, null, open, outbreak, passive dns, pattern match, paypal, phish, phishing, phishing site, phishtank, png image, pony, predator, presenoker, pulse pulses, qakbot, qbot, quasar, raccoon, ransom, ransomexx, ransomware, redline, redline stealer, referrer, refresh, relayrouter, remcos, response, restart, riskware, rostpay, runescape, russia unknown, safe site, sample, samples, scan endpoints, scanner, script, search, service, silk road, site, smokeloader, softonic, span, spyrixkeylogger, spyware, ssh, SSH, ssl certificate, stealer, strings, summary, suppobox, swrort, systweak, tag count, team, Telnet, threat report, tools, tor, trojan, trojanspy, tsara brashears, twitter, type, union, united, unknown, unsafe, urls, url summary, verify, vidar, wacatac, win64, windows nt, xcnfe
  • Known tor exit node

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: blocklist_net_ua, botscout_30d, botscout_7d, cruzit_web_attacks, dm_tor, et_tor, haley_ssh, maxmind_proxy_fraud, sblam, stopforumspam_180d, stopforumspam_1d, stopforumspam_30d, stopforumspam_365d, stopforumspam_7d, stopforumspam_90d, stopforumspam, tor_exits_1d, tor_exits_30d, tor_exits_7d, tor_exits

  • Known TOR node
  • Country: France
  • Network: AS20766 association gitoyen
  • Noticed: 1 times
  • Protcols Attacked: Anonymous Proxy
  • Countries Attacked: Bangladesh, Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Malaysia, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: block2.mmms.eu 80.67.172.162 algrothendieck.nos-oignons.net algrothendieck.globenet.org

Malware Detected on Host

Count: 47 2fd353ffcace535b5c0cdd3b70784bcbf1d4e35879a3109ed8825c2f970d22d3 ec43e150012d049bbdf9a552c9a466482c628db8b981064584998a97d2662914 a896be5e1f5b7d498d6556c9d64fe6407b70360e36dd3f47ee46da9367748ff6 31e336d15f3414e6bae7056b612b3529b0af5c6656f93f9c3d51312a3ce8935c 7b0dad1c77e7e11c5e9fc857bfac196a309d6935b18bdbf4835a359ebd32f186 535e1c4f803b46fd72987eb0bff7123bdac763585e1f6b8986beb5016e7e8461 3860ea2ed314e3d46277e277a035ae21a9cf02b50fd354245e94c2e46f459928 29c01feda65cbf7e7aac2a553b1c37fa094cc3474881fa585d0bb3f6e1a6e48b e1a3459ff37353aa98cd1bbcff4da83ac94e55385479c2320e3e4c27a5fd2ec0 64d81c30166b6495353d62680d52c026f5f301531fbf527582e0d9b10e0217f9

Open Ports Detected

123 443 4443 80 9001

Map

Whois Information

  • inetnum: 80.67.172.0 - 80.67.172.255
  • netname: GLOBENET
  • descr: Globenet network
  • descr: Globenet
  • descr: 21 ter, rue Voltaire
  • descr: 75011 Paris
  • country: FR
  • org: ORG-GLOB1-RIPE
  • admin-c: NG243-RIPE
  • tech-c: NG243-RIPE
  • status: ASSIGNED PA
  • mnt-by: Gitoyen-NCC
  • created: 2007-05-24T23:05:19Z
  • last-modified: 2023-08-03T07:53:43Z
  • organisation: ORG-GLOB1-RIPE
  • org-name: Association Globenet
  • org-type: OTHER
  • address: Globenet
  • address: 21 ter, rue Voltaire
  • address: 75011 Paris
  • address: FRANCE
  • mnt-by: Gitoyen-NCC
  • mnt-ref: Gitoyen-NCC
  • admin-c: NG243-RIPE
  • tech-c: NG243-RIPE
  • abuse-c: NG243-RIPE
  • created: 2015-12-12T19:49:03Z
  • last-modified: 2015-12-12T19:49:03Z
  • role: NOC Globenet
  • address: 21 Ter rue Voltaire
  • address: F-75011 Paris
  • phone: +33 (1) 43 70 30 51
  • fax-no: +33 (1) 43 72 15 77
  • admin-c: NL973-RIPE
  • admin-c: CM12414-RIPE
  • admin-c: JD4314-RIPE
  • tech-c: CM12414-RIPE
  • tech-c: JD4314-RIPE
  • nic-hdl: NG243-RIPE
  • abuse-mailbox: [email protected]
  • mnt-by: Gitoyen-NCC
  • created: 2002-07-22T12:56:28Z
  • last-modified: 2018-05-19T16:25:04Z
  • route: 80.67.160.0/19
  • descr: Route to Gitoyen
  • org: ORG-GG4-RIPE
  • origin: AS20766
  • mnt-by: Gitoyen-NCC
  • created: 2001-11-13T14:29:13Z
  • last-modified: 2015-12-12T19:58:36Z
  • organisation: ORG-GG4-RIPE
  • org-name: Association “Gitoyen”
  • country: FR
  • org-type: LIR
  • address: 21 ter rue Voltaire
  • address: 75011
  • address: Paris
  • address: FRANCE
  • phone: +33189168261
  • admin-c: SB18329-RIPE
  • admin-c: JD4314-RIPE
  • admin-c: PLB73-RIPE
  • admin-c: CM12414-RIPE
  • admin-c: JR5446-RIPE
  • admin-c: GI1036-RIPE
  • mnt-ref: Gitoyen-NCC
  • mnt-ref: RIPE-NCC-HM-MNT
  • mnt-by: RIPE-NCC-HM-MNT
  • mnt-by: Gitoyen-NCC
  • abuse-c: GI1036-RIPE
  • created: 2004-04-17T11:22:08Z
  • last-modified: 2021-09-21T21:12:04Z

Links to attack logs

aws-ssh-bruteforce-ip-list-2021-04-14 dofrank-ssh-bruteforce-ip-list-2023-01-02 bruteforce-ip-list-2023-01-13 bruteforce-ip-list-2023-01-24 dotoronto-ssh-bruteforce-ip-list-2023-03-16 bruteforce-ip-list-2021-06-16 anonymous-proxy-ip-list-2023-05-25 vultrparis-ssh-bruteforce-ip-list-2023-02-27 vultrparis-ssh-bruteforce-ip-list-2022-12-04 dotoronto-ssh-bruteforce-ip-list-2023-02-21 dolondon-ssh-bruteforce-ip-list-2023-02-21 vultrparis-ssh-bruteforce-ip-list-2022-12-29 vultrmadrid-ssh-bruteforce-ip-list-2023-03-27 dosing-ssh-bruteforce-ip-list-2023-02-12