IP Address: 201.168.129.98Malicious
IP Address: 201.168.129.98Malicious
This IP address attempted an attack on a machine in our threat sensors network
Role |
Attacker, Scanner |
Services Targeted |
SMB |
Tags |
Service Creation Service Deletion Successful MSRPC Login Successful SMB Login Service Start MSRPC Access Suspicious Domain SMB Outgoing Connection CMD |
Associated Attack Servers |
45.157.71.68 58.84.42.247 61.190.37.146 77.60.97.107 146.190.121.55 165.227.32.93 178.62.253.14 198.199.80.121 203.161.24.140 203.189.127.149 218.28.100.211 221.222.184.49 222.160.64.206 |
IP Address |
201.168.129.98 |
|
Domain |
- |
|
ISP |
Marcatel Com, S.A. de C.V. |
|
Country |
Mexico |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Akamai Guardicore Segmentation |
2021-10-28 |
Last seen in Akamai Guardicore Segmentation |
2024-01-28 |
What is Akamai Guardicore SegmentationAkamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SMB with the following username: administrator - Authentication policy: Reached Max Attempts |
Successful SMB Login |
A user logged in using SMB with the following username: administrator - Authentication policy: Previously Approved User |
Successful SMB Login |
c:\windows\system32\services.exe installed and started mshta.exe as a service named AC05 under service group None |
Service Creation Service Start |
Service MSIServer was started |
Service Start |
A user logged in using MSRPC from JTA15-430 with the following username: administrator - Authentication policy: Previously Approved User 2 times |
Successful MSRPC Login |
Process c:\windows\system32\msiexec.exe generated outgoing network traffic to: 198.199.80.121:11490, 218.28.100.211:16774 and 221.222.184.49:14130 |
Outgoing Connection |
A user logged in using SMB with the following username: administrator - Authentication policy: Previously Approved User |
Successful SMB Login |
c:\windows\system32\services.exe installed and started mshta.exe as a service named AC04 under service group None |
Service Creation Service Start |
Process c:\windows\system32\msiexec.exe attempted to access suspicious domains: zz.ha.cn |
Outgoing Connection Access Suspicious Domain |
Connection was closed due to user inactivity |
|
/var/tmp/dota3.tar.gz |
SHA256: 5f8d1def0982bde31d69b2bce5ecb483f108098de6f5fd73d8e3ff6784ce2f5b |
2088960 bytes |
C:\Windows\Installer\MSI1D98.tmp |
SHA256: 6094c813ca4bd0c647b950ba286bd338ef3623fa953b3bcf1a359b88f7296e55 |
144896 bytes |