85.202.169.116 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 85.202.169.116 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Likely Malicious Host 🟠 60/100

Host and Network Information

  • Mitre ATT&CK IDs: T1036.003 - Rename System Utilities, T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol, T1059.001 - PowerShell, T1098.004 - SSH Authorized Keys, T1134.001 - Token Impersonation/Theft, T1548.001 - Setuid and Setgid, T1548.002 - Bypass User Account Control, T1548.003 - Sudo and Sudo Caching
  • Tags: cyber security, ioc, malicious, Nextray, phishing, sha1, sha256, size

  • View other sources: Spamhaus VirusTotal

  • Country: Netherlands
  • Network: AS211252 delis llc
  • Noticed: 1 times
  • Protcols Attacked: snmp
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: nerot.top t.nerot.top

Malware Detected on Host

Count: 77 ffcbd47879e3a3e36b01e104636cb4947fa290ce60496054a7a32ecf3cecabf2 0190cb9e53fda3197b42b21537e8dcdef1342cc62401c32b8acc058c9f1778e6 abffcd9672196a4208bc481a905310e8cd7d047b3aa1b99c05ee615a70cf3c48 2ef7d34d98cbc65284677a762cdd4b691a68c038488e938e173bdd47a91e11ee 2006321492a29b6e38c62cf7ffadf6bd60e0e1d61f33d284f68ecba12140e098 595a5d21b386ba8e30b567cbe575b24ed104ee589037a48aa2d277452ba0b6a6 a722285815b9a0fa151991c8cbd152321ab03f862acffd3076b1b35647811de6 fab79e25eaef112dc7fc80cba25d9e2a2fe6af44bf35c7573d9375959540879d 611479c78035c912dd69e3cfdadbf74649bb1fce6241b7573cfb0c7a2fc2fb2f d75a7ee1a791ac1260fa1e83e6cd066dcf1446f2d52b136d226b8de8c284cd06

Open Ports Detected

110 25 443 80

CVEs Detected

CVE-2006-20001 CVE-2013-4352 CVE-2013-5704 CVE-2013-6438 CVE-2014-0098 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2014-3523 CVE-2014-3581 CVE-2014-8109 CVE-2015-0228 CVE-2015-3183 CVE-2015-3184 CVE-2015-3185 CVE-2016-0736 CVE-2016-2161 CVE-2016-4975 CVE-2016-5387 CVE-2016-8612 CVE-2016-8743 CVE-2017-15710 CVE-2017-15715 CVE-2017-3167 CVE-2017-3735 CVE-2017-3736 CVE-2017-3737 CVE-2017-3738 CVE-2017-7679 CVE-2017-9788 CVE-2017-9798 CVE-2018-0732 CVE-2018-0734 CVE-2018-0737 CVE-2018-0739 CVE-2018-1283 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-1312 CVE-2018-17199 CVE-2018-5407 CVE-2019-0217 CVE-2019-0220 CVE-2019-10092 CVE-2019-10098 CVE-2019-1547 CVE-2019-1551 CVE-2019-1552 CVE-2019-1559 CVE-2019-1563 CVE-2019-17567 CVE-2020-11985 CVE-2020-13938 CVE-2020-1927 CVE-2020-1934 CVE-2020-1968 CVE-2020-1971 CVE-2020-35452 CVE-2021-23840 CVE-2021-23841 CVE-2021-26690 CVE-2021-26691 CVE-2021-34798 CVE-2021-3712 CVE-2021-39275 CVE-2021-40438 CVE-2021-4160 CVE-2021-44790 CVE-2022-0778 CVE-2022-1292 CVE-2022-2068 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 CVE-2022-26377 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31813 CVE-2022-36760 CVE-2022-37436 CVE-2022-4304 CVE-2023-0215 CVE-2023-0286 CVE-2023-0464 CVE-2023-0465 CVE-2023-0466 CVE-2023-25690 CVE-2023-2650 CVE-2023-3817

Map

Whois Information

  • inetnum: 85.202.168.0 - 85.202.169.255
  • netname: SERVER-85-202-168-0
  • country: NL
  • org: ORG-SB656-RIPE
  • admin-c: SBAH20-RIPE
  • tech-c: SBAH20-RIPE
  • status: ASSIGNED PA
  • mnt-by: PREFIXBROKER-MNT
  • created: 2021-03-04T10:30:18Z
  • last-modified: 2021-03-04T10:30:18Z
  • organisation: ORG-SB656-RIPE
  • org-name: Serverion BV
  • org-type: OTHER
  • address: Krammer 8
  • address: 3232HE Brielle
  • address: Netherlands
  • abuse-c: SBAH20-RIPE
  • mnt-ref: PREFIXBROKER-MNT
  • mnt-by: PREFIXBROKER-MNT
  • created: 2021-03-04T10:30:18Z
  • last-modified: 2021-03-04T10:30:18Z
  • role: Serverion BV abuse handling
  • address: Krammer 8
  • address: 3232HE Brielle
  • address: Netherlands
  • nic-hdl: SBAH20-RIPE
  • mnt-by: PREFIXBROKER-MNT
  • created: 2021-03-04T10:30:18Z
  • last-modified: 2021-03-04T10:30:18Z
  • abuse-mailbox: [email protected]
  • route: 85.202.169.0/24
  • origin: AS399471
  • mnt-by: PREFIXBROKER-MNT
  • created: 2023-11-01T16:17:28Z
  • last-modified: 2023-11-01T16:17:28Z

Links to attack logs

awsau-snmp-bruteforce-ip-list-2021-12-18