192.119.160.186 to present a potentially very high fraud risk. This IP address is operated by A2F Networks whose web traffic we consider to present a potentially high fraud risk, and is owned by Madgenius.com whose web traffic we also consider to present a potentially high fraud risk. In each of these cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) on port 22. Scamalytics see high levels of web traffic from this IP address across our global network, almost all of which we suspect to be potentially fraudulent. Considering only the web traffic where we have visibility, we apply a risk score of 100/100 to 192.119.160.186, which reflects the proportion of this traffic which we suspect to be potentially fraudulent. If you see web traffic from this IP address there is potentially a very high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk. The device on 192.119.160.186 is operating an anonymising VPN, which could be proxying traffic from another geographical location. The geographical location of 192.119.160.186 is in the United States, however the geographical location of the user could be anywhere in the world.
{ "ip":"192.119.160.186", "score":"100", "risk":"very high" }
Operator | |
---|---|
Hostname | n/a |
ASN | 9009 - M247 |
ISP Name | Madgenius.com |
Organization Name | A2F Networks |
Connection type | wireless |
Location | |
Country Name | United States |
Country Code | US |
Region | California |
City | Los Angeles |
Postal Code | 90009 |
Metro Code | n/a |
Area Code | n/a |
Latitude | 34.0522 |
Longitude | -118.2440 |
Port Scan | |
TCP 139/netbios-ssn |
Filtered |
TCP 3389/ssh |
Open OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0) |
TCP 25/smtp |
Filtered |
TCP 106/pop3pw |
Filtered |
TCP 543/klogin |
Filtered |
TCP 179/bgp |
Filtered |
TCP 22/ssh |
Open OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) |
TCP 53/domain |
Closed |
TCP 80/http |
Open nginx 1.10.3 (Ubuntu) |
TCP 113/ident |
Closed |
TCP 443/https |
Closed |
TCP 1723/pptp |
Open linux (Firmware: 1) |
TCP 21/ftp |
Open FileZilla ftpd |
TCP 143/imap |
Open Microsoft Exchange 2007-2010 imapd |
TCP 8080/http |
Open Jetty 9.2.14.v20151106 |
TCP 49152/msrpc |
Open Microsoft Windows RPC |
TCP 49153/msrpc |
Open Microsoft Windows RPC |
TCP 49154/msrpc |
Open Microsoft Windows RPC |
TCP 49155/msrpc |
Open Microsoft Windows RPC |
TCP 49156/unknown |
Closed |
TCP 49157/unknown |
Closed |
TCP 23/telnet |
Open |
TCP 389/ldap |
Filtered |
TCP 646/ldp |
Filtered |
TCP 1720/h323q931 |
Filtered |
TCP 2000/cisco-sccp |
Filtered |
TCP 5060/sip |
Filtered |
TCP 135/msrpc |
Filtered |
TCP 445/microsoft-ds |
Filtered |
TCP 993/imaps |
Filtered |
TCP 5009/airport-admin |
Filtered |
TCP 554/rtsp |
Open |
TCP 8443/ssl/https-alt? |
Open |
TCP 88/kerberos-sec |
Closed |
TCP 995/ssl/pop3s? |
Open |
Proxies | |
Anonymizing VPN | Yes |
Tor Exit Node | No |
Server | No |
Public Proxy | No |
Web Proxy | No |
Search Engine Robot | No |
Domain Names | |
n/a |
IP Address data partner DB-IP.com:
Proxy data sponsored by IP2Proxy:
IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.