IP Address: 200.93.148.19Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
200.93.148.19
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Connect-Back, Scanner |
Services Targeted |
SSH |
Tags |
Scheduled Task Creation Outgoing Connection Successful SSH Login Download and Execute Download and Allow Execution Access Suspicious Domain Listening New SSH Key SSH |
Associated Attack Servers |
ontitel.com opendns.com colocrossing.com amazonaws.com linode.com whatismyipaddress.com akamaitechnologies.com ufps.edu.co ip-144-217-234.net one.one timeweb.ru your-server.de tasteavision.com hybs-pro.net 139.198.255.161 185.59.51.113 165.22.109.146 154.204.27.212 94.130.234.92 47.52.93.164 47.56.95.206 206.81.3.202 104.248.30.224 47.240.55.237 176.58.123.25 157.230.225.168 103.129.199.250 47.52.211.179 27.102.115.83 47.56.108.23 154.221.31.185 43.225.157.91 59.3.145.7 154.83.16.122 23.200.147.33 154.221.19.43 148.251.173.37 208.67.222.222 139.162.219.43 103.36.84.148 198.1.81.46 103.216.218.127 162.244.82.35 104.123.71.137 |
IP Address |
200.93.148.19 |
|
Domain |
- |
|
ISP |
ETB |
|
Country |
Colombia |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2020-01-06 |
Last seen in Guardicore Centra |
2020-05-02 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / ****** - Authentication policy: Reached Max Attempts |
Successful SSH Login |
Process /usr/bin/wget generated outgoing network traffic to: 67.205.164.163:8000 |
Outgoing Connection |
Process /usr/local/bin/dash generated outgoing network traffic to: 67.205.164.163:8000 |
Outgoing Connection |
The file /usr/bin/lunlfaa was downloaded and executed 20 times |
Download and Execute |
Process /usr/bin/lunlfaa generated outgoing network traffic to: 1.1.1.1:53, 103.130.214.39:8895, 103.216.218.127:6130, 103.36.84.148:9591, 104.20.17.242:80, 104.248.30.224:5902, 110.10.129.112:2603, 119.9.77.75:7650, 142.93.220.73:9290, 144.217.234.169:5558, 154.221.31.185:2849, 162.244.82.35:7865, 176.58.123.25:80, 18.213.79.189:80, 188.225.32.97:8739, 192.227.140.90:2460, 200.93.148.19:5029, 206.81.3.202:6397, 208.67.222.222:443, 216.239.32.21:80, 216.239.38.21:80, 23.55.221.152:80, 27.102.115.83:6418, 47.52.93.164:6062, 47.56.108.23:8309, 47.56.15.123:2734, 47.91.210.124:5387, 61.19.103.60:6741 and 66.171.248.178:80 |
Outgoing Connection |
Process /usr/bin/lunlfaa attempted to access suspicious domains: ip-144-217-234.net and one.one |
Access Suspicious Domain Outgoing Connection |
Process /usr/bin/lunlfaa started listening on ports: 2460 |
Listening |
Process /bin/bash generated outgoing network traffic to: 67.205.164.163:8000 |
Outgoing Connection |
Connection was closed due to timeout |
|
An attempt to download /root/.ssh/authorized_keys was made |
New SSH Key |
IP Address: 200.93.148.19Previously Malicious