Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 35.205.189.29Previously Malicious

IP Address: 35.205.189.29Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

SCP

Tags

Port 1234 Scan SSH 5 Shell Commands Listening SCP Port 80 Scan Outgoing Connection Superuser Operation Successful SSH Login Download File Access Suspicious Domain

Associated Attack Servers

1.117.70.249 95.154.21.210

Basic Information

IP Address

35.205.189.29

Domain

-

ISP

Google Cloud

Country

-

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2020-03-10

Last seen in Akamai Guardicore Segmentation

2022-09-27

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: White List

Successful SSH Login

Process /bin/nc.openbsd scanned port 1234 on 17 IP Addresses

Port 1234 Scan

Process /dev/shm/apache2 scanned port 1234 on 17 IP Addresses

Port 1234 Scan Port 80 Scan

Process /dev/shm/apache2 scanned port 1234 on 32 IP Addresses

Port 1234 Scan Port 80 Scan

Process /dev/shm/apache2 scanned port 80 on 17 IP Addresses

Port 1234 Scan Port 80 Scan

Process /bin/nc.openbsd scanned port 1234 on 17 IP Addresses

Port 1234 Scan

Process /bin/bash scanned port 1234 on 17 IP Addresses

Port 1234 Scan

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: Correct Password 2 times

Successful SSH Login

/dev/shm/ifconfig was downloaded

Download File

A possibly malicious Superuser Operation was detected 2 times

Superuser Operation

Process /dev/shm/apache2 generated outgoing network traffic to: 1.1.1.1:443, 108.201.9.46:80, 118.238.42.81:80, 120.224.34.31:1234, 120.236.78.194:1234, 122.100.186.74:80, 124.115.231.214:1234, 124.223.14.100:1234, 126.60.93.82:80, 128.52.123.240:80, 131.171.227.130:80, 133.96.156.183:80, 14.251.172.171:80, 142.237.100.237:80, 142.250.190.68:443, 143.15.31.212:80, 143.208.243.65:80, 148.216.127.248:80, 16.55.226.72:80, 161.107.113.27:1234, 169.62.9.27:80, 171.41.108.195:80, 172.64.131.4:443, 179.201.179.241:80, 181.39.73.82:80, 183.211.125.219:80, 183.213.26.13:1234, 188.50.194.90:80, 190.12.120.30:1234, 209.216.177.158:1234, 211.162.184.120:1234, 222.134.240.92:1234, 223.171.91.149:1234, 223.171.91.160:1234, 223.171.91.191:1234, 23.59.244.220:80, 244.218.101.217:80, 250.27.70.178:80, 29.54.146.40:80, 31.177.9.10:80, 34.121.140.175:80, 35.205.189.29:80, 35.205.189.29:8080, 40.237.28.6:80, 51.75.146.174:443, 58.229.125.66:1234, 6.88.131.15:80, 68.34.1.147:80, 7.69.240.84:80, 71.4.146.143:80, 79.216.108.9:80, 8.8.4.4:443, 8.8.8.8:443, 95.154.21.210:1234 and 95.154.21.210:2222

Outgoing Connection

Process /dev/shm/apache2 started listening on ports: 1234, 8081 and 8182

Listening

Process /dev/shm/apache2 attempted to access suspicious domains: googleusercontent.com and sefiber.dk

Access Suspicious Domain Outgoing Connection

Process /dev/shm/apache2 scanned port 80 on 32 IP Addresses

Port 1234 Scan Port 80 Scan

Connection was closed due to user inactivity