89.163.154.91 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 89.163.154.91 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 50/100

Host and Network Information

  • Tags: Nextray, TOR, VPN, cyber security, ioc, kfsensor, malicious, phishing, probing, rdp, scanning, ssh, webscan, webscanner bruteforce web app attack

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: haley_ssh, sblam, tor_exits, tor_exits_1d, tor_exits_30d, tor_exits_7d

  • Country: Germany
  • Network: AS24961 myloc managed it ag
  • Noticed: 1 times
  • Protcols Attacked: SSH
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: www.mauersfall.de mauersfall.de www.fridays-for-futures.com fridays-for-futures.com

Malware Detected on Host

Count: 16 5a55cf9c74493e1a65a6402d0286a95fedd4007bb5354aab615d10a5eadbadef ec43e150012d049bbdf9a552c9a466482c628db8b981064584998a97d2662914 fc7243f492f7668e45390697f8f1eb83ee668767f3a77255b6bebae045efff6b e5739b349ee82e21bb692c94725df0d7fb8424a794a58eb19d198f3f22e17f90 31e336d15f3414e6bae7056b612b3529b0af5c6656f93f9c3d51312a3ce8935c 2e1cb6a2cb1b284dbdd0b8d47d53f946ca0b27a196c45600cc656889c2e57623 d643588fd00e7cbb933a634a3a1636e4b789dd7bc22ecf4a83c80f133ab1a849 a4a63515b6bd2562e94430e10629c0c9e69309b2281dc857628cd537909c0352 b73eaa192ab95cab8e279d904a301d61ec84be69781b369bd73e538437680bc3 175947117e7dfbe4d0b437034d850cb8bb063038d1b1ab0219c56ddc6464b395

Map

Whois Information

  • inetnum: 89.163.128.0 - 89.163.255.255
  • netname: DE-MYLOC-DUS-20060217
  • country: DE
  • org: ORG-MMIA3-RIPE
  • admin-c: MOPS-RIPE
  • tech-c: MOPS-RIPE
  • status: ALLOCATED PA
  • mnt-by: MYLOC-MNT
  • mnt-by: RIPE-NCC-HM-MNT
  • created: 2020-11-04T10:31:12Z
  • last-modified: 2020-11-04T10:31:12Z
  • organisation: ORG-MMIA3-RIPE
  • org-name: myLoc managed IT AG
  • country: DE
  • org-type: LIR
  • address: Am Gatherhof 44
  • address: 40472
  • address: Düsseldorf
  • address: GERMANY
  • phone: +4921161708110
  • fax-no: +4921161708111
  • admin-c: MOPS-RIPE
  • tech-c: MOPS-RIPE
  • abuse-c: MOPS-RIPE
  • mnt-ref: MYLOC-MNT
  • mnt-by: RIPE-NCC-HM-MNT
  • mnt-by: MYLOC-MNT
  • created: 2019-10-28T10:48:29Z
  • last-modified: 2021-02-09T10:11:49Z
  • role: myLoc NOC
  • address: myLoc managed IT AG
  • address: Network Operations & Services
  • address: Am Gatherhof 44
  • address: 40472 Duesseldorf DE
  • admin-c: PHAN
  • tech-c: PHAN
  • tech-c: DDO
  • tech-c: JOH
  • tech-c: NIL
  • tech-c: STH
  • tech-c: KT3550-RIPE
  • nic-hdl: MOPS-RIPE
  • abuse-mailbox: [email protected]
  • mnt-by: MYLOC-MNT
  • created: 2013-02-11T16:38:10Z
  • last-modified: 2022-07-08T14:48:44Z
  • route: 89.163.128.0/17
  • descr: myLoc managed IT AG
  • origin: AS24961
  • mnt-by: MYLOC-MNT
  • created: 2017-02-02T17:04:51Z
  • last-modified: 2017-02-02T17:06:25Z

Links to attack logs

bruteforce-ip-list-2021-05-24