192.119.160.240 Fraud Risk

Medium Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 56
100
IP address 192.119.160.240 is operated by A2F Networks whose web traffic we consider to present a potentially medium fraud risk. Non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) on port 22. Scamalytics see high levels of traffic from A2F Networks across our global network, some of which we suspect to be potentially fraudulent. We have no visibility into the web traffic directly from 192.119.160.240, and therefore apply a risk score of 56/100 based on the overall risk from A2F Networks’s IP addresses where we do have visibility. The device on 192.119.160.240 is operating an anonymising VPN, which could be proxying traffic from another geographical location. The geographical location of 192.119.160.240 is in the United States, however the geographical location of the user could be anywhere in the world.
IP Fraud Risk API
{
  "ip":"192.119.160.240",
  "score":"56",
  "risk":"medium"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname n/a
ASN 9009 - M247
ISP Name Madgenius.com
Organization Name A2F Networks
Connection type n/a
Location
Country Name United States
Country Code US
Region California
City Los Angeles
Postal Code 90009
Metro Code n/a
Area Code n/a
Latitude 34.0522
Longitude -118.2440
Port Scan
TCP
81/hosts2-ns
Closed
TCP
8000/ipcam
Open
Hikvision IPCam control port
TCP
22/ssh
Open
OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
TCP
23/telnet
Filtered
TCP
25/smtp
Filtered
TCP
80/http
Open
Apache httpd 2.4.29
TCP
443/openvpn
Open
OpenVPN
TCP
465/smtps
Filtered
TCP
587/submission
Filtered
TCP
53/tcpwrapped
Open
TCP
9100/jetdirect
Filtered
TCP
8443/https-alt
Closed
TCP
113/ident
Filtered
TCP
135/msrpc
Filtered
TCP
139/netbios-ssn
Filtered
TCP
444/snpp?
Open
TCP
646/ldp
Filtered
TCP
2000/bandwidth-test
Open
MikroTik bandwidth-test server
TCP
32768/filenet-tms
Closed
TCP
49152/unknown
Closed
TCP
49153/unknown
Closed
TCP
49154/unknown
Closed
TCP
49155/unknown
Closed
TCP
49156/unknown
Closed
TCP
49157/unknown
Closed
TCP
8008/http
Open
Tor built-in httpd (DirPortFrontPage configured)
TCP
993/ssl/imaps?
Open
TCP
995/ssl/pop3s?
Open
TCP
1723/pptp
Closed
Proxies
Anonymizing VPN
Yes
Tor Exit Node
No
Server
No
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
n/a

IP Address data partner DB-IP.com:

DB-IP

Proxy data sponsored by IP2Proxy:

IP2Proxy

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.