94.100.6.72 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 94.100.6.72 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Potentially Malicious Host 🟡 35/100

Host and Network Information

  • Tags: cyber security, ioc, malicious, Nextray, phishing, TOR, VPN

  • View other sources: Spamhaus VirusTotal
  • Contained within other IP sets: dm_tor, et_tor

  • Country: Latvia
  • Network: AS47570 telia latvija sia
  • Noticed: 1 times
  • Protcols Attacked: SSH
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: ns2.webconcept.lv

Malware Detected on Host

Count: 48 ec43e150012d049bbdf9a552c9a466482c628db8b981064584998a97d2662914 012314a413eeffca3d9fd46d188780f04a2319d45fbb564483da872fa33124c0 6df1f4f91cb9d7693f2dce7d4f3dc82e7e41b05262ecd80b945cafed4706cdb6 3e58909e3bd960cdde00cc32b7f7587772f924515fd8ec6a8b967af23c8f6da8 a896be5e1f5b7d498d6556c9d64fe6407b70360e36dd3f47ee46da9367748ff6 f2744211b31da71e037ef39ba48d69773117cc8e88dcccdb08c9f1a8077b2021 7b0dad1c77e7e11c5e9fc857bfac196a309d6935b18bdbf4835a359ebd32f186 c2946599fd85d75a15003f2eb0f56c51ca25c9a06e3dfe6aaf49a4594a6ee255 f3000d56afe77e0d95335f7ea86562b3c0e598c1c66ecd4d62e5ccc8af6569d3 7548589cca05a011b563d58e795233faf2310975659bbc8b4d1db7ae6d805280

Open Ports Detected

123 443

Map

Whois Information

  • inetnum: 94.100.6.0 - 94.100.6.255
  • netname: DC-OGRE
  • descr: IPV1 SIA
  • country: LV
  • admin-c: IH918-RIPE
  • tech-c: IH918-RIPE
  • status: ASSIGNED PA
  • mnt-by: INETCOMLV-MNT
  • created: 2012-03-18T21:13:47Z
  • last-modified: 2021-03-29T18:01:13Z
  • role: KOPIDEJA HostMaster
  • address: Kurzemes iela 9
  • address: LV-3101 Tukums
  • admin-c: MA2793-RIPE
  • tech-c: AA1001-RIPE
  • tech-c: MA2793-RIPE
  • nic-hdl: IH918-RIPE
  • mnt-by: MNT-KOPIDEJA
  • created: 2008-09-03T15:09:08Z
  • last-modified: 2015-03-18T15:34:08Z
  • abuse-mailbox: [email protected]
  • route: 94.100.6.0/24
  • origin: AS47570
  • mnt-by: INETCOMLV-MNT
  • created: 2016-03-25T20:21:34Z
  • last-modified: 2016-03-25T20:21:34Z
  • descr: DC_EWAY

Links to attack logs

bruteforce-ip-list-2020-01-29