Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 222.134.240.92Malicious

IP Address: 222.134.240.92Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

SCP SSH

Tags

SSH Superuser Operation SCP Download File Download and Allow Execution Successful SSH Login Download and Execute

Associated Attack Servers

alter.net tenet.odessa.ua vultrusercontent.com

1.1.1.1 5.64.253.92 9.28.21.71 9.101.192.3 12.23.46.220 18.135.230.208 18.176.208.194 19.131.179.175 21.6.80.143 21.65.124.132 22.48.181.76 37.174.59.30 45.120.216.114 47.112.205.162 52.155.131.204 55.66.37.76 58.229.125.66 64.227.132.175 77.97.56.229 81.23.46.89 85.190.254.31 86.133.233.66 86.166.142.12 89.121.228.38 89.193.32.164 95.117.59.143 95.154.21.210 96.11.177.173 97.20.206.40 100.186.176.226

Basic Information

IP Address

222.134.240.92

Domain

-

ISP

China Unicom Shandong

Country

China

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2022-03-24

Last seen in Akamai Guardicore Segmentation

2024-07-22

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: White List

Successful SSH Login

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: Correct Password 2 times

Successful SSH Login

/dev/shm/ifconfig was downloaded

Download File

A possibly malicious Superuser Operation was detected 14 times

Superuser Operation

Process /dev/shm/ifconfig scanned port 1234 on 43 IP Addresses

Port 1234 Scan

Process /tmp/ifconfig scanned port 1234 on 43 IP Addresses

Port 1234 Scan

Process /root/ifconfig scanned port 1234 on 43 IP Addresses

Port 1234 Scan

Process /var/tmp/ifconfig scanned port 1234 on 43 IP Addresses

Port 1234 Scan Port 80 Scan

Process /var/tmp/ifconfig scanned port 80 on 43 IP Addresses

Port 1234 Scan Port 80 Scan

Process /var/tmp/ifconfig scanned port 1234 on 20 IP Addresses

Port 1234 Scan Port 80 Scan

Process /dev/shm/ifconfig started listening on ports: 1234, 8087 and 8180

Listening

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: Correct Password

Successful SSH Login

Process /dev/shm/ifconfig generated outgoing network traffic to: 102.141.225.238:1234, 102.141.225.244:1234, 117.16.44.111:1234, 120.224.143.251:1234, 13.36.151.196:1234, 172.64.200.11:443, 172.64.201.11:443, 191.242.188.103:1234, 195.87.73.176:1234, 20.56.195.26:1234, 31.14.115.42:1234, 40.87.11.253:1234, 51.75.146.174:443, 84.16.224.173:1234 and 85.51.217.156:1234

Outgoing Connection

The file /tmp/ifconfig was downloaded and executed 6 times

Download and Execute

The file /tmp/apache2 was downloaded and executed 278 times

Download and Execute

Process /tmp/ifconfig generated outgoing network traffic to: 1.220.98.197:1234, 102.141.225.244:1234, 117.16.44.111:1234, 118.41.204.72:1234, 120.236.74.234:1234, 146.56.115.253:1234, 172.64.200.11:443, 172.64.201.11:443, 173.18.35.41:1234, 20.56.195.26:1234, 222.165.136.99:1234, 44.202.10.176:1234, 61.84.162.66:1234, 62.12.106.6:1234 and 78.187.13.206:1234

Outgoing Connection

Process /tmp/ifconfig started listening on ports: 1234, 8088 and 8183

Listening

./ifconfig was downloaded 2 times

Download File

The file /root/ifconfig was downloaded and executed 5 times

Download and Execute

The file /root/apache2 was downloaded and executed 90 times

Download and Execute

Process /root/ifconfig generated outgoing network traffic to: 172.64.201.11:443

Outgoing Connection

Process /root/ifconfig started listening on ports: 1234, 8080 and 8180

Listening

The file /var/tmp/ifconfig was downloaded and executed 5 times

Download and Execute

The file /var/tmp/apache2 was downloaded and executed 337 times

Download and Execute

Process /var/tmp/ifconfig generated outgoing network traffic to: 1.1.1.1:443, 100.47.98.180:80, 101.35.198.225:1234, 102.141.225.238:1234, 102.141.225.244:1234, 118.41.204.72:1234, 120.236.74.234:1234, 120.236.78.194:1234, 121.199.57.14:1234, 121.200.53.148:1234, 126.92.137.51:80, 143.198.133.234:1234, 144.148.79.230:80, 163.123.181.132:1234, 172.64.200.11:443, 172.64.201.11:443, 18.16.113.115:80, 181.46.158.167:80, 182.224.177.33:1234, 185.74.186.187:80, 186.3.110.87:80, 187.6.3.3:1234, 191.242.188.103:1234, 195.87.73.176:1234, 198.20.66.80:80, 20.56.195.26:1234, 202.61.203.229:1234, 209.216.177.158:1234, 221.181.232.56:1234, 222.165.136.99:1234, 240.169.252.5:80, 243.33.234.37:80, 252.81.134.11:80, 26.67.138.115:80, 29.30.64.205:80, 31.158.164.235:80, 36.112.152.152:1234, 36.136.59.42:80, 40.87.11.253:1234, 45.120.216.114:1234, 53.137.203.207:80, 58.216.8.121:1234, 59.1.226.211:1234, 6.93.178.223:80, 61.84.162.66:1234, 69.236.215.6:1234, 76.4.146.31:80, 78.187.13.206:1234, 82.64.113.245:1234, 84.143.208.58:80, 84.16.224.173:1234, 85.105.82.39:1234, 85.51.217.156:1234, 85.51.24.68:1234, 89.121.228.38:1234 and 98.137.27.192:80

Outgoing Connection

Process /var/tmp/ifconfig started listening on ports: 1234, 8081 and 8185

Listening

Process /var/tmp/ifconfig scanned port 80 on 20 IP Addresses

Port 1234 Scan Port 80 Scan

Connection was closed due to timeout

Associated Files

/var/tmp/ifconfig

SHA256: 003fc3b1c6259d744b011cde32a47e8cb0b00708ebec1465839b9c14279bc70b

262144 bytes

/etc/ifconfig

SHA256: 0c3b215edd9eb22cfd0f81de2113a215a40d8cff99171feac4b5ee75c65d2bf6

622592 bytes

/root/ifconfig

SHA256: 0e6a3f82df2ed1afd7206639cc49661a3d5beac2c0906f77aa4bea24e0ab1c36

1015808 bytes

/var/tmp/ifconfig

SHA256: 0fc0b3ba908c52402b1d5724f87368c8e66aadbb9b472b0583c000954a21d989

327680 bytes

/tmp/ifconfig

SHA256: 1ade857be2b35f0864210be4d77eb8e2df0d91433ba55771c0b66fa8ecdcbf1e

2785280 bytes

/var/tmp/ifconfig

SHA256: 35b110f66523d2471be5b955bff5de91626218640b178a5b1a688c8f5ca175b7

524288 bytes

/tmp/ifconfig

SHA256: 3812ae9118bbee02b96c19758b2f8232053e6e8d201c060c878b383d11a535b3

2129920 bytes

/var/tmp/ifconfig

SHA256: 3b9707d2b3c510499a866fe655f57f05eba1eb55566b03979602e5b9d6616a05

655360 bytes

/var/tmp/ifconfig

SHA256: 3c7a7c5e08ac88c4a76354a64b531b4f27388d24008c36d3b5c8d618bcdb5b5b

458752 bytes

/var/tmp/ifconfig

SHA256: 3cea85e9d84a56ff3a512e16382d5582d0f7f4a649f3d2353e0567be55933453

3113300 bytes

/root/ifconfig

SHA256: 414e372827556874a59f0d9c8d5f3ec425970524fc6e33246df44eebee49d9db

622592 bytes

/etc/ifconfig

SHA256: 487c565bcda2af744400dc2ae2211cd6af4997b1ec084f173ef6605f91b8b0b8

720896 bytes

/etc/ifconfig

SHA256: 49fd787bb9fd2f4e5338b7548824e3017d7de9cdeff62ef1e2d64104c0604297

229376 bytes