IP Address: 104.148.21.172Previously Malicious
IP Address: 104.148.21.172Previously Malicious
This IP address attempted an attack on a machine in our threat sensors network
Role |
Attacker, Scanner |
Services Targeted |
RDP |
Tags |
Listening Service Start HTTP Successful RDP Login Human File Operation By CMD Access Suspicious Domain DNS Query CMD RDP |
Associated Attack Servers |
bhwrdvhoa4ry2p25zlziuld0qrvre9ud.dns.whatleaks.com ocsp.pki.goog p0f.whatleaks.com ulb6ihso4hg2q5a92y7pnov8ip0fogub.dns.whatleaks.com www.bing.com |
IP Address |
104.148.21.172 |
|
Domain |
- |
|
ISP |
Global Frag Networks |
|
Country |
United States |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Akamai Guardicore Segmentation |
2021-04-27 |
Last seen in Akamai Guardicore Segmentation |
2021-05-06 |
What is Akamai Guardicore SegmentationAkamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using RDP with the following credentials: Administrator / ***** - Authentication policy: White List |
Successful RDP Login |
Process c:\program files\internet explorer\iexplore.exe attempted to access domains: go.microsoft.com, iecvlist.microsoft.com, ieonline.microsoft.com, ocsp.digicert.com and www.bing.com |
DNS Query |
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-314712940\browserconfig.xml was downloaded |
Download File |
Process c:\program files (x86)\internet explorer\iexplore.exe attempted to access domains: apps.identrust.com, cacerts.digicert.com, crl.identrust.com, mc.yandex.ru, ocsp.digicert.com, p0f.whatleaks.com, repository.certum.pl, ulb6ihso4hg2q5a92y7pnov8ip0fogub.dns.whatleaks.com, urs.microsoft.com, whatleaks.com and www.google-analytics.com |
DNS Query |
Process c:\program files (x86)\internet explorer\iexplore.exe attempted to access suspicious domains: ctldl.windowsupdate.com, ocsp.pki.goog, r3.o.lencr.org, subca.ocsp-certum.com and yandex.ocsp-responder.com |
DNS Query Access Suspicious Domain |
Service fdPHost was started |
Service Start |
Process LocalService Service Group started listening on ports: 3702 |
Listening |
Connection was closed due to timeout |
|