IP Address: 81.214.58.71Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
81.214.58.71
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
MSSQL |
Tags |
CMD DNS Query Execute MsSql Shell Command IDS - Attempted User Privilege Gain Successful MSSQL Login Drop MsSql Table Service Start Create MsSql Procedure PowerShell Bulk Files Tampering Access Suspicious Domain MSSQL |
Associated Attack Servers |
IP Address |
81.214.58.71 |
|
Domain |
- |
|
ISP |
Turk Telekom |
|
Country |
Turkey |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2019-11-10 |
Last seen in Guardicore Centra |
2019-11-10 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using MSSQL with the following credentials: sa / ********* - Authentication policy: White List |
Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: sa / ********* - Authentication policy: Previously Approved User |
Successful MSSQL Login |
MSSQL procedures were created: sp_dropextendedproc |
Create MsSql Procedure |
IDS detected Attempted User Privilege Gain : MS-SQL SQL Injection closing string plus line comment |
IDS - Attempted User Privilege Gain |
IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change |
IDS - Attempted User Privilege Gain |
IDS detected Attempted User Privilege Gain : xp_reg* - registry access |
IDS - Attempted User Privilege Gain |
IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution |
IDS - Attempted User Privilege Gain |
MSSQL executed 1 shell commands |
Execute MsSql Shell Command |
Service msiserver was started |
Service Start |
Process c:\windows\system32\msiexec.exe attempted to access suspicious domains: es.ldbdhm.xyz |
Access Suspicious Domain DNS Query |
MSSQL tables were dropped: #A0F47917 , #A2DCC189 and #A4C509FB |
Drop MsSql Table |
IDS detected Attempted User Privilege Gain : sp_start_job - program execution |
IDS - Attempted User Privilege Gain |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe attempted to access suspicious domains: es.ldbdhm.xyz 6 times |
Access Suspicious Domain DNS Query |
PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe 6 times |
|
Process NetworkService Service Group attempted to access suspicious domains: es.ldbdhm.xyz |
Access Suspicious Domain DNS Query |
Connection was closed due to user inactivity |
|
Process system performed bulk changes in {c:\windows\system32\windowspowershell} on 15 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 59 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 52 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 58 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 52 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 54 files |
Bulk Files Tampering |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 63 files |
Bulk Files Tampering |
IP Address: 81.214.58.71Previously Malicious