Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 47.100.108.185Previously Malicious

IP Address: 47.100.108.185Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

SSH

Tags

4 Shell Commands Port 2222 Scan Listening Download and Execute Download and Allow Execution SSH Port 22 Scan Successful SSH Login

Associated Attack Servers

-

Basic Information

IP Address

47.100.108.185

Domain

-

ISP

Hangzhou Alibaba Advertising Co.,Ltd.

Country

China

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2020-05-05

Last seen in Akamai Guardicore Segmentation

2020-06-03

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List

Successful SSH Login

A user logged in using SSH with the following credentials: root / **** - Authentication policy: Correct Password

Successful SSH Login

A user logged in using SSH with the following credentials: root / **** - Authentication policy: Correct Password

Successful SSH Login

The file /var/spool/ifconfig was downloaded and executed 7 times

Download and Execute

The file /var/spool/nginx was downloaded and executed 110 times

Download and Execute

Process /var/spool/nginx scanned port 22 on 51 IP Addresses

Port 22 Scan Port 2222 Scan

Process /var/spool/nginx scanned port 2222 on 51 IP Addresses

Port 22 Scan Port 2222 Scan

Process /var/spool/nginx scanned port 22 on 43 IP Addresses

Port 22 Scan Port 2222 Scan

Process /var/spool/nginx started listening on ports: 1234

Listening

Process /var/spool/nginx generated outgoing network traffic to: 109.161.17.141:22, 109.161.17.141:2222, 111.244.101.67:22, 111.244.101.67:2222, 115.154.214.199:22, 115.154.214.199:2222, 118.157.167.228:22, 118.157.167.228:2222, 120.37.84.69:2222, 125.82.91.71:22, 126.114.148.90:22, 126.114.148.90:2222, 133.103.7.226:22, 133.103.7.226:2222, 136.26.225.169:22, 14.138.232.153:22, 140.56.131.156:22, 142.138.247.185:22, 142.138.247.185:2222, 143.12.51.59:22, 143.12.51.59:2222, 146.79.181.249:22, 146.79.181.249:2222, 16.125.99.66:22, 165.193.197.28:22, 171.179.158.149:22, 171.179.158.149:2222, 173.23.169.158:22, 174.178.181.221:22, 174.178.181.221:2222, 175.93.153.127:22, 176.133.242.191:22, 176.133.242.191:2222, 177.211.28.76:22, 18.226.194.183:22, 183.55.36.34:22, 183.55.36.34:2222, 193.119.108.223:22, 193.119.108.223:2222, 195.37.100.160:22, 195.37.100.160:2222, 197.164.111.206:22, 198.53.29.61:22, 198.53.29.61:2222, 199.185.43.209:22, 199.185.43.209:2222, 200.110.30.2:22, 203.158.45.84:22, 203.158.45.84:2222, 206.215.122.247:2222, 214.116.31.165:22, 214.116.31.165:2222, 216.2.110.217:22, 216.2.110.217:2222, 223.19.113.154:22, 23.248.64.86:22, 24.211.163.90:22, 24.211.163.90:2222, 243.58.81.98:2222, 249.44.123.185:22, 249.44.123.185:2222, 28.217.9.4:22, 28.217.9.4:2222, 29.90.45.47:22, 29.90.45.47:2222, 36.134.74.188:22, 36.134.74.188:2222, 39.97.50.162:2222, 40.134.39.12:2222, 42.223.11.188:22, 42.223.11.188:2222, 42.46.129.10:22, 42.46.129.10:2222, 48.249.247.148:22, 48.249.247.148:2222, 5.96.146.207:22, 5.96.146.207:2222, 61.96.86.32:22, 61.96.86.32:2222, 63.87.159.64:22, 63.87.159.64:2222, 66.133.150.4:22, 66.133.150.4:2222, 7.251.108.113:22, 7.251.108.113:2222, 71.115.186.90:22, 71.115.186.90:2222, 78.81.181.117:2222, 79.113.62.209:22, 79.113.62.209:2222, 83.155.125.146:2222, 91.4.31.51:22 and 91.4.31.51:2222

Process /var/spool/nginx scanned port 2222 on 43 IP Addresses

Port 22 Scan Port 2222 Scan

The file /usr/bin/uptime was downloaded and executed 2 times

Download and Execute

Connection was closed due to timeout