141.255.162.34 Fraud Risk

Very high Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 100
100
IP address ​​141.255.162.34 is operated by ​Clientid5392 whose ​​web traffic we consider to present a potentially very high​ fraud risk. This IP address is owned by ​​Private Layer INC whose web traffic we also consider to present a potentially high fraud risk. In both cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) on port 22. Scamalytics see high levels of traffic from Clientid5392 across our global network, ​almost all of which we suspect to be potentially fraudulent. We have no visibility into the web traffic directly from ​141.255.162.34​, and therefore apply a risk score of ​100​/100 based on the overall risk from ​Clientid5392​’s IP addresses where we do have visibility. If you see web traffic from this IP address there is potentially a very high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk. The device on​ 141.255.162.34 is operating ​a public proxy, which could be proxying traffic from another geographical location. The geographical location of 141.255.162.34 is in Switzerland, however the geographical location of the user could be anywhere in the world.
IP Fraud Risk API
{
  "ip":"141.255.162.34",
  "score":"100",
  "risk":"very high"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname darksoul01.trilightzone.co.nz
ASN 51852 - PLI-AS
ISP Name Private Layer INC
Organization Name Clientid5392
Connection type n/a
Location
Country Name Switzerland
Country Code CH
Region Bern
City Bern
Postal Code 3000
Metro Code n/a
Area Code n/a
Latitude 46.9480
Longitude 7.4475
Port Scan
TCP
81/hosts2-ns
Closed
TCP
8000/ipcam
Open
Hikvision IPCam control port
TCP
23/telnet
Filtered
TCP
22/ssh
Open
OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
TCP
53/tcpwrapped
Open
TCP
80/http
Open
nginx 1.18.0
TCP
443/ssl/http
Open
nginx 1.18.0
TCP
9100/jetdirect
Filtered
TCP
389/ldap
Closed
TCP
990/ftps
Closed
TCP
111/rpcbind
Open
2-4 (RPC #100000)
TCP
3128/http
Open
Proxmox Virtual Environment REST API 3.0
TCP
5432/postgresql
Open
PostgreSQL DB 9.6.0 or later
TCP
25/smtp
Filtered
TCP
465/smtps
Filtered
TCP
587/submission
Filtered
TCP
135/msrpc
Filtered
TCP
139/netbios-ssn
Filtered
TCP
445/microsoft-ds
Filtered
TCP
49152/unknown
Closed
TCP
49153/unknown
Closed
TCP
49154/unknown
Closed
TCP
49156/unknown
Closed
TCP
49157/unknown
Closed
TCP
32768/filenet-tms
Closed
TCP
49155/unknown
Closed
TCP
113/ident
Closed
TCP
8008/http
Open
Tor built-in httpd (DirPortFrontPage configured)
TCP
8443/http
Open
Tor built-in httpd (DirPortFrontPage configured)
Proxies
Anonymizing VPN
No
Tor Exit Node
No
Server
No
Public Proxy
Yes
Web Proxy
No
Search Engine Robot
No
Domain Names
darksoul01.trilightzone.co.nz

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.