IP Address: 46.29.166.194Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
46.29.166.194
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
HTTP |
Tags |
IDS - Web Application Attack Inbound HTTP Request HTTP Download and Execute Download File Download and Allow Execution Outgoing Connection |
Associated Attack Servers |
52.174.179.113 94.177.247.231 52.173.143.203 52.166.206.33 52.173.242.8 137.135.80.180 52.168.169.156 40.68.244.223 13.90.98.228 52.186.127.89 191.237.45.174 52.170.98.243 46.17.45.73 137.116.207.112 |
IP Address |
46.29.166.194 |
|
Domain |
- |
|
ISP |
LLC Baxet |
|
Country |
Russian Federation |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2019-04-28 |
Last seen in Guardicore Centra |
2019-06-02 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
Process /usr/bin/wget generated outgoing network traffic to: 46.17.45.73:80 5 times |
Outgoing Connection |
The file /tmp/bins.sh was downloaded and granted execution privileges |
Download and Allow Execution |
The file /tmp/ntpd was downloaded and granted execution privileges |
Download and Allow Execution |
The file /tmp/sshd was downloaded and granted execution privileges |
Download and Allow Execution |
IDS detected Web Application Attack : 401TRG Generic Webshell Request - POST with wget in body |
IDS - Web Application Attack |
The file /tmp/openssh was downloaded and granted execution privileges |
Download and Allow Execution |
The file /tmp/bash was downloaded and executed |
Download and Execute |
Connection was closed due to user inactivity |
|
/tmp/bins.sh |
SHA256: ddb538ab90bb188ee8fb715f593f05674007e7bc345176c3006700d7a62c7d9c |
1592 bytes |
/tmp/ntpd |
SHA256: a3c511691623dabece368cc6e020e49153aaab6a3febbd190e0a8297ebe8ed9c |
162669 bytes |
/tmp/sshd |
SHA256: 44897e2ceaa6f361aab05606961f1975c29379563ed099ba4bbecdaf952607ea |
165658 bytes |
/tmp/openssh |
SHA256: 1d312a9c394b1640fa1aeb5ce3c8326e1e393d4d2582f8dceea9f3a689cad625 |
123572 bytes |
/tmp/bash |
SHA256: 966b52c61fc9ae37670c7a073b1c888ae39b3cfc6291769183a056dff0afaa8a |
137464 bytes |
/tmp/ntpd |
SHA256: c5a7b39851e21eabcd17e6be59349ef877251a69c7814ddb139779e6e42654f6 |
60386 bytes |
IP Address: 46.29.166.194Previously Malicious