threatintelligence.guardicore.com
Open in
urlscan Pro
34.95.107.128
Public Scan
URL:
https://threatintelligence.guardicore.com/
Submission: On February 01 via api from US — Scanned from DE
Submission: On February 01 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form onsubmit="return false;" class="search">
<input type="search" name="search" placeholder="Search IP or Domain" class="search-field">
<input type="submit" value="" class="search-btn" onclick="searchPage()">
</form>
Text Content
WANT TO KNOW MORE? Check out our blog post about Guardicore Cyber Threat Intelligence READ MORE Week Time GUARDICORE.COM CONTACT US CAREERS INFECTION MONKEY BLOG GUARDICORE LABS GUARDICORE CENTRA CYBER THREAT INTELLIGENCE DISCOVER MALICIOUS IPS AND DOMAINS WITH GUARDICORE CYBER THREAT FEED LAST WEEK Jan 23 2022 - Jan 30 2022 DOWNLOAD FEED TOP ATTACKERS This chart lists the top ten attacking IP addresses observed by GuardiCore sensors around the world. The attackers coming from these IPs use penetration techniques such as brute force password guessing and exploiting known and unknown (zero day) vulnerabilities. Once the machine has been compromised, these attackers execute a wide range of attack tools to establish their control over the victim machine and attempt to further propagate across the network. TOP ATTACKERS Created with Highcharts 6.1.1Number of AttacksTop Ten AttackersChart portrays the top ten attackers we observed over GGSNTime Frame: 2022-01-23,2022-01-305006007008009001k2k 212.193.30.137207.180.238.8138.68.109.14943.155.111.10996.69.13.14082.156.46.187161.35.236.2445.9.150.113104.211.77.31157.230.40.119 TOP ATTACKED SERVICES BY PORT This chart presents the services that are most often attacked over the internet. This helps detect new malware outbreaks in their early stages (e.g. WannaCry) by identifying a dramatic surge in the number of attacks targeting a specific service. TOP ATTACKED SERVICES BY PORT Created with Highcharts 6.1.1Port NumberNumber of ScansPorts DistributionChart portrays the top ten most active scanners detected over GGSNTime Frame: 2022-01-23,2022-01-30374K374K67672280101001k10k100k1M TOP MALICIOUS DOMAINS This table lists the top malicious domains attackers currently use. Attackers use domains rather than hard coding IP addresses to allow them to constantly shift infrastructure. These domains usually serve as file servers to download post-breach tools, C&C servers to control the different attack tools, and logging servers to send data from the victim machines. TOP MALICIOUS DOMAINS xmr.crypto-pool.frponeytelecom.euusapyonsoft.jp TOP MALICIOUS IPS This table list the top IPs attackers connect to after breaching a server. These machines usually serve as file servers to download post-breach tools (e.g. Remote Administration Tools (RAT) network and vulnerability scanners, exploit and cryptocurrency tools ), C&C servers to control the different attack tools, and logging servers to send data from the victim machines. TOP MALICIOUS IPS 157.245.41.7745.9.148.99142.93.127.16104.236.182.223 TOP SCANNERS This chart lists the most active scanners. Scanners are machines that access one or more services across one or more subnets monitored by GuardiCore sensors without performing attacks. The attackers run scanners to locate vulnerable services that can fit their exploitation methods (e.g. bad configuration, out-of-date software). TOP SCANNERS Created with Highcharts 6.1.1Number of ScansTop Ten Active ScannersChart portrays the top ten most active scanners detected over GGSNTime Range: 2022-01-23,2022-01-301.5k2k2.5k3k3.5k4k4.5k5k5.5k 46.19.139.18195.3.147.47193.105.134.4561.177.173.331.7.57.130222.186.42.7218.93.208.150222.187.232.10222.186.31.166222.186.180.130 SCRIPT VS. HUMAN This chart shows the percentage of human attacks within the overall attacks. Attacks operated by humans (as opposed to automated attack scripts) may suggest an insider threat or a more skillful external actor. These attackers don’t usually aim for crypto mining, traffic monetization or DDOS botnet creation. Instead, once access has been gained, they try to move laterally across the organization to steal confidential information, shut down activity for long periods of time, etc... SCRIPT VS. HUMAN Created with Highcharts 6.1.1Script vs. HumanDistribution of script-based attacks vs. human-based attacks between: 2022-01-23,2022-01-30ScriptHuman OOPS! - DO YOU SEE YOUR IP HERE? CONTACT US AT LABS@GUARDICORE.COM TO REMOVE IT FROM THE THREAT INTELLIGENCE DATA. ABOUT GUARDICORE CYBER THREAT INTELLIGENCE The Guardicore Cyber Threat Intelligence service offers unique information on malicious Internet assets - IP addresses and domains - detected by Guardicore. Threat information is based on three main resources: Guardicore Global Sensors Network (GGSN), Guardicore Reputation Services, and the insights of the Guardicore Labs team. 80 k+ Sensors 80 IOC Types 80 k+ Scanners 80 k+ Attackers VISIT OUR RESEARCH LABS GUARDICORE LABS GUARDICORE GLOBAL SENSORS NETWORK (GGSN) A network of deception servers installed in multiple data centers around the world, streaming early threat information to Guardicore Labs for attack identification and analysis. OUR RESOURCES GUARDICORE REPUTATION ANALYSIS (GRA) A cloud-based service that identifies indicators of compromise (IoCs) based on the presence of suspicious domain names, IP addresses, and file hashes associated with known malicious activity. GUARDICORE LABS Guardicore’s global research team is comprised of leading cyber security experts whose mission is to provide analysis, insights and response methodologies to the latest cyber threats. WANT MORE? If you have questions or comments about this threat data or want to learn more, contact our security experts. labs@guardicore.com HomeProductUse CasesPartnersCompanyResourcesBlogSupportNews & PressContact UsCustomer PortalTerm Of UsePrivacy PolicyLabs © 2019 Guardicore This chart presents the services that are most often attacked over the internet. This helps detect new malware outbreaks in their early stages (e.g. WannaCry) by identifying a dramatic surge in the number of attacks targeting a specific service. LAST WEEK Jan 23 2022 - Jan 30 2022 OOPS! - DO YOU SEE YOUR IP HERE? CONTACT US AT LABS@GUARDICORE.COM TO REMOVE IT FROM THE THREAT INTELLIGENCE DATA.