192.119.160.186 Fraud Risk

Very high Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 100
100
We consider web traffic from IP address

192.119.160.186 to present a potentially very high fraud risk. This IP address is operated by A2F Networks whose web traffic we consider to present a potentially high fraud risk, and is owned by Madgenius.com whose web traffic we also consider to present a potentially high fraud risk. In each of these cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) on port 22. Scamalytics see high levels of web traffic from this IP address across our global network, almost all of which we suspect to be potentially fraudulent. Considering only the web traffic where we have visibility, we apply a risk score of 100/100 to 192.119.160.186, which reflects the proportion of this traffic which we suspect to be potentially fraudulent. If you see web traffic from this IP address there is potentially a very high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk. The device on 192.119.160.186 is operating an anonymising VPN, which could be proxying traffic from another geographical location. The geographical location of 192.119.160.186 is in the United States, however the geographical location of the user could be anywhere in the world.

IP Fraud Risk API
{
  "ip":"192.119.160.186",
  "score":"100",
  "risk":"very high"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname n/a
ASN 9009 - M247
ISP Name Madgenius.com
Organization Name A2F Networks
Connection type wireless
Location
Country Name United States
Country Code US
Region California
City Los Angeles
Postal Code 90009
Metro Code n/a
Area Code n/a
Latitude 34.0522
Longitude -118.2440
Port Scan
TCP
139/netbios-ssn
Filtered
TCP
3389/ssh
Open
OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
TCP
25/smtp
Filtered
TCP
106/pop3pw
Filtered
TCP
543/klogin
Filtered
TCP
179/bgp
Filtered
TCP
22/ssh
Open
OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
TCP
53/domain
Closed
TCP
80/http
Open
nginx 1.10.3 (Ubuntu)
TCP
113/ident
Closed
TCP
443/https
Closed
TCP
1723/pptp
Open
linux (Firmware: 1)
TCP
21/ftp
Open
FileZilla ftpd
TCP
143/imap
Open
Microsoft Exchange 2007-2010 imapd
TCP
8080/http
Open
Jetty 9.2.14.v20151106
TCP
49152/msrpc
Open
Microsoft Windows RPC
TCP
49153/msrpc
Open
Microsoft Windows RPC
TCP
49154/msrpc
Open
Microsoft Windows RPC
TCP
49155/msrpc
Open
Microsoft Windows RPC
TCP
49156/unknown
Closed
TCP
49157/unknown
Closed
TCP
23/telnet
Open
TCP
389/ldap
Filtered
TCP
646/ldp
Filtered
TCP
1720/h323q931
Filtered
TCP
2000/cisco-sccp
Filtered
TCP
5060/sip
Filtered
TCP
135/msrpc
Filtered
TCP
445/microsoft-ds
Filtered
TCP
993/imaps
Filtered
TCP
5009/airport-admin
Filtered
TCP
554/rtsp
Open
TCP
8443/ssl/https-alt?
Open
TCP
88/kerberos-sec
Closed
TCP
995/ssl/pop3s?
Open
Proxies
Anonymizing VPN
Yes
Tor Exit Node
No
Server
No
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
n/a

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.