IP Address: Malicious

Weekly Summary

Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network

Top Threats

Cyber Threat Intelligence

Discover Malicious IPs and Domains with Guardicore Cyber Threat Feed

IP Address:​
Previously Malicious

This IP address attempted an attack on a machine protected by Guardicore Centra

Threat Information


Attacker, Scanner

Services Targeted



HTTP HadoopYARN Malicious File IDS - Web Application Attack Outgoing Connection Download and Allow Execution Download and Execute Download File Inbound HTTP Request

Associated Attack Servers

Basic Information

IP Address




Digital Ocean


United States


Created Date


Updated Date




First seen in Guardicore Centra


Last seen in Guardicore Centra


What is Guardicore Centra
Guardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

Process /usr/bin/wget generated outgoing network traffic to:

Outgoing Connection

The file /tmp/mysql.sock.lock was downloaded and granted execution privileges

IDS detected Web Application Attack : 401TRG Generic Webshell Request - POST with wget in body

IDS - Web Application Attack

The file /tmp/bash was downloaded and executed 3 times

Download and Execute

Process /tmp/bash generated outgoing network traffic to:

Outgoing Connection

Connection was closed due to user inactivity

/tmp/bash was identified as malicious by YARA according to rules: 000 Common Rules

Malicious File

Associated Files


SHA256: 00dff82c147656e5cfbcb0c2de5a5fd0d91ef6f8499651eb2c77140a450ba083

82757 bytes


SHA256: 2ef562397714d20ce007063757384ef1b26fbca2d4d8d6bf7ad87c177d95fbf0

82757 bytes


SHA256: bd200ca2e991caa3c94673613db8781bde3f3931dfa2824ac7396754e69ec2e3

82753 bytes


SHA256: 8660cb1dafc2b040ede9d65fcd73cdae67548d19e21281d25ba7ce35b1692e12

11680 bytes


SHA256: f212802ce82f8ffa5257fc40d78148fc53c83fc272de450e1654f682674308da

28944 bytes


SHA256: e5671684b53251ae5f7fab3c4a01a1b54723cf891664ca01a242293425d474ea

30272 bytes


SHA256: 415420644cafb4f78e64a5ff50dade76a974e9b2e9451e6b6ff8325043ed2e60

68784 bytes


SHA256: 9d58aab399301d9cba3da99bf6f67eec0650aaed4ec718245d12ae2d4d1ea9f7

47536 bytes


SHA256: fc4d9e7a3177b612ae53fac532549395a7c83da6751706d14176e0d0619cf2b7

82757 bytes


SHA256: 0fb4704e1c0188c3170203582866a302d810f840945126fe979010617c1399fd

51128 bytes

Oops! - Do you see your IP here? Contact us at labs@guardicore.com to remove it from the Threat Intelligence data.

IP Address:​Previously Malicious