IP Address: 181.46.136.22Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
181.46.136.22
Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker |
Services Targeted |
MSSQL |
Tags |
DNS Query Bulk Files Tampering Service Start Create MsSql Procedure Drop MsSql Table CMD PowerShell Access Suspicious Domain MSSQL Successful MSSQL Login IDS - Attempted User Privilege Gain Execute MsSql Shell Command |
Connect Back Servers |
IP Address |
181.46.136.22 |
|
Domain |
- |
|
ISP |
- |
|
Country |
Argentina |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2019-10-20 |
Last seen in Guardicore Centra |
2019-10-20 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using MSSQL with the following credentials: sa / ********** - Authentication policy: Reached Max Attempts |
Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: sa / ********** - Authentication policy: Previously Approved User |
Successful MSSQL Login |
MSSQL procedures were created: sp_dropextendedproc |
Create MsSql Procedure |
IDS detected Attempted User Privilege Gain : MS-SQL SQL Injection closing string plus line comment |
IDS - Attempted User Privilege Gain |
IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change |
IDS - Attempted User Privilege Gain |
IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution |
IDS - Attempted User Privilege Gain |
MSSQL executed 1 shell commands |
Execute MsSql Shell Command |
Service msiserver was started |
Service Start |
IDS detected Attempted User Privilege Gain : xp_reg* - registry access |
IDS - Attempted User Privilege Gain |
Process c:\windows\system32\msiexec.exe attempted to access suspicious domains: gk.vwxqv.xyz |
DNS Query Access Suspicious Domain |
MSSQL tables were dropped: #A0F471F0 , #A2DCBA62 and #A4C502D4 |
Drop MsSql Table |
IDS detected Attempted User Privilege Gain : sp_start_job - program execution |
IDS - Attempted User Privilege Gain |
PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe 6 times |
|
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe attempted to access suspicious domains: gk.vwxqv.xyz 6 times |
DNS Query Access Suspicious Domain |
Process NetworkService Service Group attempted to access suspicious domains: gk.vwxqv.xyz |
DNS Query Access Suspicious Domain |
Connection was closed due to user inactivity |
|
Process system performed bulk changes in {c:\windows\system32\windowspowershell} on 14 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 64 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 60 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 61 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local} on 51 files |
Bulk Files Tampering |
IP Address: 181.46.136.22Malicious