Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 47.94.192.120Previously Malicious

IP Address: 47.94.192.120Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

HTTP Human Download Operation Outgoing Connection Download File Successful SSH Login DNS Query 9 Shell Commands Access Suspicious Domain SSH

Associated Attack Servers

dl.mrreacher.com netrepid.net speedtestfognob.clarityconnect.com speedtest.netrepid.net speedtest.rivervalleyinternet.net

66.115.67.54 151.101.2.219 172.67.132.210 192.48.105.15 192.81.87.238 204.11.243.115 209.150.227.82

Basic Information

IP Address

47.94.192.120

Domain

-

ISP

Hangzhou Alibaba Advertising Co.,Ltd.

Country

China

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-08-13

Last seen in Akamai Guardicore Segmentation

2021-08-13

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List

Successful SSH Login

A possibly malicious Download Operation was detected 3 times

Download Operation

Process /bin/bash attempted to access suspicious domains: dl.mrreacher.com

DNS Query Access Suspicious Domain Outgoing Connection

Process /bin/bash generated outgoing network traffic to: 172.67.132.210:443

Outgoing Connection

/root/zt.py was downloaded

Download File

Process /bin/bash attempted to access domains: www.speedtest.net

DNS Query

Process /bin/bash generated outgoing network traffic to: 151.101.2.219:443, 151.101.2.219:80, 192.48.105.15:8080, 192.81.87.238:8080, 204.11.243.115:8080, 209.150.227.82:8080 and 66.115.67.54:8080

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: image1tech.net, netrepid.net, speedtest.empireaccess.com, speedtest.image1tech.net, speedtest.netrepid.net, speedtest.rivervalleyinternet.net and speedtestfognob.clarityconnect.com

DNS Query Access Suspicious Domain Outgoing Connection

Connection was closed due to user inactivity