IP Address: 94.23.173.249Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
94.23.173.249
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker |
Services Targeted |
SSH |
Tags |
SFTP 2 Shell Commands Successful SSH Login DNS Query Port 22 Scan SSH Download and Execute Outgoing Connection |
Connect Back Servers |
igxhhnue75hvk5yc.onion.nu lmco62zvt7fnezd5.onion.link onion.nu |
IP Address |
94.23.173.249 |
|
Domain |
- |
|
ISP |
OVH Hosting |
|
Country |
Czechia |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2017-07-02 |
Last seen in Guardicore Centra |
2017-07-13 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List |
Successful SSH Login |
The file /tmp/4WQYOZwkbHwR23N was downloaded and executed 2 times |
Download and Execute |
Process /tmp/4WQYOZwkbHwR23N generated outgoing network traffic to: 181.218.229.231:22, 194.3.126.222:22, 187.133.245.60:22, 56.187.232.51:22, 133.138.234.31:22, 187.67.46.186:22, 146.224.152.185:22, 145.21.90.176:22, 189.196.85.146:22, 108.245.32.139:22, 145.58.90.125:22, 70.132.29.242:22, 69.117.111.11:22, 34.205.124.128:22, 20.96.61.173:22, 112.196.148.246:22, 4.192.166.181:22, 85.21.69.175:22, 198.108.211.136:22, 166.59.155.26:22, 196.152.122.238:22, 101.77.53.252:22, 198.34.26.158:22, 87.148.210.85:22, 128.217.57.159:22, 8.167.124.8:22, 49.64.251.217:22, 174.13.42.105:22, 143.221.23.195:22, 44.91.167.70:22, 134.240.228.160:22, 57.160.151.136:22, 178.135.178.188:22, 104.58.229.79:22, 97.83.99.159:22, 86.157.136.39:22, 184.154.20.187:22, 15.182.178.87:22, 203.188.228.248:22, 119.235.60.22:22, 130.130.110.26:22, 165.251.242.196:22, 102.132.210.89:22, 165.189.245.49:22, 147.138.124.10:22, 138.205.236.167:22, 124.41.112.58:22, 132.130.77.192:22, 201.229.174.97:22, 35.240.128.199:22, 77.128.25.57:22, 68.226.225.84:22, 137.49.0.173:22, 32.63.136.14:22, 181.155.234.248:22, 51.212.172.154:22, 200.48.103.216:22, 143.195.48.79:22, 206.215.116.83:22, 165.234.109.172:22, 103.198.0.2:80, 66.254.36.75:22, 137.106.78.112:22, 103.204.135.168:22, 212.224.213.146:22, 74.81.121.203:22, 170.245.71.121:22, 135.61.55.4:22, 159.0.106.102:22, 223.171.55.83:22, 89.60.246.124:22, 48.86.207.5:22, 4.237.193.237:22, 16.6.104.177:22, 155.153.176.246:22, 201.120.217.75:22, 92.177.48.69:22, 149.3.174.101:22, 200.4.65.179:22, 14.195.16.2:22, 4.210.35.209:22, 64.208.122.62:22, 143.159.12.126:22, 174.130.244.85:22, 8.16.203.149:22, 158.188.30.132:22, 135.183.102.160:22, 139.78.96.127:22, 223.147.232.150:22, 125.42.230.70:22, 31.80.106.134:22, 80.71.37.243:22, 131.17.110.98:22, 45.202.158.227:22, 32.92.129.149:22, 50.185.165.200:22, 166.84.121.169:22, 167.137.134.227:22, 196.187.254.145:22 and 36.233.72.15:22 |
Outgoing Connection |
Process /tmp/4WQYOZwkbHwR23N scanned port 22 on 99 IP Addresses |
Port 22 Scan |
/tmp/4WQYOZwkbHwR23N |
SHA256: c2d779e3af5fb536116eaf529f448e2cbbd5462914089cee52de5ee291cd753e |
4390176 bytes |
/tmp/4MgDyR15sp9 |
SHA256: 1aa18e69df7ebefd6056d72257230e3aaf7fccec6a238beaee193fa8733f4401 |
4390176 bytes |
IP Address: 94.23.173.249Previously Malicious