Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 35.176.210.24Previously Malicious

IP Address: 35.176.210.24Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Download Operation HTTP Outgoing Connection DNS Query 6 Shell Commands Access Suspicious Domain Download and Execute Successful SSH Login SSH Download File

Associated Attack Servers

138.68.148.132 140.82.113.4 185.199.108.154

Basic Information

IP Address

35.176.210.24

Domain

-

ISP

Amazon.com

Country

United Kingdom

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-11-16

Last seen in Akamai Guardicore Segmentation

2021-11-24

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List

Successful SSH Login

A possibly malicious Download Operation was detected

Download Operation

Process /bin/bash attempted to access domains: github.com

DNS Query

Process /bin/bash generated outgoing network traffic to: 140.82.113.4:443 and 185.199.108.154:443

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: github-releases.githubusercontent.com

DNS Query Access Suspicious Domain Outgoing Connection

/root/xmrig-6.15.3-linux-x64.tar.gz was downloaded

Download File

The file /root/xmrig-6.15.3/xmrig was downloaded and executed 27 times

Download and Execute

Process /bin/bash attempted to access domains: rx.unmineable.com

DNS Query

Process /bin/bash generated outgoing network traffic to: 138.68.148.132:3333

Outgoing Connection

Connection was closed due to timeout