IP Address: 43.242.247.139Malicious
IP Address: 43.242.247.139Malicious
This IP address attempted an attack on a machine in our threat sensors network
Role |
Attacker, Connect-Back, Scanner |
Services Targeted |
SSH SCP |
Tags |
SSH SCP Superuser Operation Download File Download and Allow Execution Successful SSH Login Download and Execute |
Associated Attack Servers |
accessv.com airtel.net alter.net amazonaws.com aniar.ie attdns.com az1am5.shop bbtec.net bezeqint.net bta.net.cn comcast.net comunitel.net csn.net cultimording.org.uk dns.google era.gr fetnet.net gvt.net.br inet.co.th innovatelekom.com ip-54-38-175.eu kagoya.net Majordomo.ru mdh.se ocn.ne.jp ono.com orangero.net pikara.ne.jp plus.pl pre-print.rs 90.56.118.96 245.245.1.96 47.93.228.251 45.11.19.163 22.228.207.240 118.214.168.228 241.96.30.169 126.18.238.58 61.102.42.5 203.45.245.214 74.150.183.135 247.114.39.79 177.158.88.235 99.212.249.38 241.207.174.158 11.238.171.118 188.90.84.68 51.75.146.174 52.131.32.110 42.193.137.44 91.134.185.80 183.213.26.13 206.183.126.101 15.51.43.88 82.157.166.102 25.23.8.62 77.178.185.148 210.99.20.194 27.136.89.128 215.21.5.132 |
IP Address |
43.242.247.139 |
|
Domain |
- |
|
ISP |
Micronova Network Solutions Pvt. |
|
Country |
India |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Akamai Guardicore Segmentation |
2022-01-30 |
Last seen in Akamai Guardicore Segmentation |
2023-06-16 |
What is Akamai Guardicore SegmentationAkamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / ****** - Authentication policy: White List |
Successful SSH Login |
A user logged in using SSH with the following credentials: root / ****** - Authentication policy: Correct Password 2 times |
Successful SSH Login |
A possibly malicious Superuser Operation was detected 18 times |
Superuser Operation |
Process /dev/shm/apache2 scanned port 1234 on 40 IP Addresses 2 times |
Port 1234 Scan |
Process /tmp/ifconfig scanned port 1234 on 40 IP Addresses 2 times |
Port 1234 Scan |
Process /root/apache2 scanned port 1234 on 40 IP Addresses |
Port 1234 Scan |
Process /root/ifconfig scanned port 1234 on 40 IP Addresses |
Port 1234 Scan |
Process /var/tmp/ifconfig scanned port 1234 on 40 IP Addresses 2 times |
Port 1234 Scan |
Process /root/apache2 scanned port 1234 on 40 IP Addresses |
Port 1234 Scan |
Process /dev/shm/apache2 started listening on ports: 1234, 8080 and 8188 |
Listening |
Process /dev/shm/apache2 generated outgoing network traffic to: 101.35.198.225:1234, 118.218.209.149:1234, 118.41.204.72:1234, 162.19.210.221:1234, 173.18.35.41:1234, 178.140.136.178:1234, 195.87.73.208:1234, 217.85.239.81:1234, 44.202.10.176:1234, 51.75.146.174:443, 85.53.55.133:1234 and 89.212.123.191:1234 |
Outgoing Connection |
/dev/shm/ifconfig was downloaded |
Download File |
Process /dev/shm/apache2 generated outgoing network traffic to: 120.224.143.251:1234, 120.236.79.182:1234, 129.154.55.234:1234, 172.64.200.11:443, 172.64.201.11:443, 173.18.35.41:1234, 178.140.136.178:1234, 187.6.3.3:1234, 217.85.239.81:1234, 85.105.82.39:1234, 85.51.217.156:1234 and 89.121.228.38:1234 |
Outgoing Connection |
Process /dev/shm/apache2 started listening on ports: 1234, 8082 and 8182 |
Listening |
The file /tmp/ifconfig was downloaded and executed 3 times |
Download and Execute |
The file /tmp/ifconfig was downloaded and executed 5 times |
Download and Execute |
Process /tmp/ifconfig generated outgoing network traffic to: 169.254.85.1:1234, 172.64.200.11:443, 172.64.201.11:443, 223.223.200.243:1234, 66.70.154.59:1234, 82.66.109.74:1234 and 85.51.24.68:1234 |
Outgoing Connection |
Process /tmp/ifconfig started listening on ports: 1234, 8089 and 8189 |
Listening |
The file /tmp/apache2 was downloaded and executed 18 times |
Download and Execute |
The file /tmp/apache2 was downloaded and executed 126 times |
Download and Execute |
Process /tmp/ifconfig generated outgoing network traffic to: 172.64.200.11:443, 172.64.201.11:443, 182.92.162.51:1234, 195.87.73.208:1234, 223.223.200.243:1234 and 40.87.11.253:1234 |
Outgoing Connection |
Process /tmp/ifconfig started listening on ports: 1234, 8081 and 8183 |
Listening |
./ifconfig was downloaded 2 times |
Download File |
The file /root/ifconfig was downloaded and executed 11 times |
Download and Execute |
The file /root/apache2 was downloaded and executed 82 times |
Download and Execute |
Process /root/apache2 started listening on ports: 1234, 8083 and 8189 |
Listening |
Process /root/apache2 generated outgoing network traffic to: 101.35.232.15:1234, 85.105.82.39:1234 and 89.121.228.38:1234 |
|
The file /root/apache2 was downloaded and executed 222 times |
Download and Execute |
Process /root/ifconfig generated outgoing network traffic to: 117.16.44.111:1234, 118.218.209.149:1234, 120.224.143.251:1234, 120.236.79.182:1234, 120.31.133.162:1234, 143.198.133.234:1234, 144.22.191.115:1234, 169.254.85.1:1234, 172.64.200.11:443, 172.64.201.11:443, 182.92.162.51:1234, 62.195.2.68:1234 and 85.105.82.39:1234 |
Outgoing Connection |
Process /root/ifconfig started listening on ports: 1234, 8087 and 8183 |
Listening |
The file /var/tmp/ifconfig was downloaded and executed 10 times |
Download and Execute |
The file /var/tmp/apache2 was downloaded and executed 125 times |
Download and Execute |
Process /var/tmp/ifconfig started listening on ports: 1234, 8088 and 8188 |
Listening |
Process /var/tmp/ifconfig generated outgoing network traffic to: 102.141.225.244:1234, 103.105.12.48:1234, 120.31.133.162:1234, 121.199.57.14:1234, 139.59.135.142:1234, 142.250.191.196:443, 148.71.35.230:1234, 209.216.177.158:1234, 78.187.13.206:1234 and 85.51.24.68:1234 |
|
The file /var/tmp/apache2 was downloaded and executed 96 times |
Download and Execute |
Process /var/tmp/ifconfig generated outgoing network traffic to: 172.64.200.11:443 |
Outgoing Connection |
Process /var/tmp/ifconfig started listening on ports: 1234, 8089 and 8189 |
Listening |
The file /root/ifconfig was downloaded and executed 5 times |
Download and Execute |
Process /root/apache2 started listening on ports: 1234, 8081 and 8188 |
Listening |
Process /root/apache2 generated outgoing network traffic to: 82.64.113.245:1234 and 82.66.109.74:1234 |
|
Connection was closed due to timeout |
|
/root/apache2 |
SHA256: 163397562c5c280da8200df790dc2959025b5f933847b60ac0a3a175ea5531ec |
3109940 bytes |
/etc/ifconfig |
SHA256: 6ee5b0eadb32669e495a5d4157119d3a8248235f0b3e21084070fb6bb45ca89e |
950272 bytes |
/tmp/ifconfig |
SHA256: 915f410de5799b81704f3695d8aa38d5da78b01b60cea17d3e0c3f162f9b0e9b |
1802240 bytes |
/root/ifconfig |
SHA256: 93b5387c1ad89b1bba7a1c7ad722d5406dd174e58cd0a1de5a0684e02a83fd33 |
1474560 bytes |
/etc/ifconfig |
SHA256: 861921d16b4f8870dda3d79aecaa828b713b8e41b29ec977aca10c236356144e |
1507328 bytes |
/var/tmp/ifconfig |
SHA256: d631c9ebe71bca046338a9f986aa6e9ca1bbac1610bd8bb781996cc103537ceb |
1769472 bytes |
/tmp/ifconfig |
SHA256: 9516639b92dfb73072de6c5220e3ee130547680b8870c9288eccd928de847e35 |
2883584 bytes |
/tmp/ifconfig |
SHA256: 9f26c9e5240ac92baa25aadfd4f23dcb35723982204e00da5cbfb5cb88bf56af |
1867776 bytes |
/tmp/ifconfig |
SHA256: b3b7551f344bdc4021e89ae74961531531a7dedf23e7b2d0364e21d052271ae2 |
1114112 bytes |
/tmp/ifconfig |
SHA256: 3b9707d2b3c510499a866fe655f57f05eba1eb55566b03979602e5b9d6616a05 |
655360 bytes |
/var/tmp/ifconfig |
SHA256: 550307921085269ac7b53b3492fbffd8dc7bb9deaee1b26d433b3ebb40282384 |
2195456 bytes |
/root/ifconfig |
SHA256: b68a8713bece3c5ce9b0e366dd929b6664fb1d7d569f2bc6fafe9a1bded50019 |
1671168 bytes |