195.176.3.20 Fraud Risk

Very high Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 100
100
We consider ​web traffic​ from IP address ​195.176.3.20​ to present a potentially very high fraud risk. This IP address is operated by Digitale Gesellschaft whose web traffic we ​consider to present a potentially ​medium​ fraud risk, and is owned by ​SWITCH​ whose web traffic we​ consider to present a potentially ​low​ fraud risk. In each of these cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server Dropbear sshd 2018.76 (protocol 2.0) on port 22. Scamalytics see high levels of web traffic from this IP address across our global network, ​almost all of which we suspect to be potentially fraudulent. Considering only the web traffic where we have visibility, we apply a risk score of 100​/100 to 195.176.3.20​, which reflects the proportion of this traffic which we suspect to be potentially fraudulent. If you see web traffic from this IP address there is potentially a very high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk. The device on​ 195.176.3.20 is operating ​a TOR exit node, which could be proxying traffic from another geographical location. The geographical location of 195.176.3.20 is in Switzerland, however the geographical location of the user could be anywhere in the world.
IP Fraud Risk API
{
  "ip":"195.176.3.20",
  "score":"100",
  "risk":"very high"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname tor4e3.digitale-gesellschaft.ch
ASN 559 - SWITCH Peering requests: <peering@switch.ch>
ISP Name SWITCH
Organization Name Digitale Gesellschaft
Connection type n/a
Location
Country Name Switzerland
Country Code CH
Region Zurich
City Zurich
Postal Code 8000
Metro Code n/a
Area Code n/a
Latitude 47.3769
Longitude 8.5417
Port Scan
TCP
22/ssh
Open
Dropbear sshd 2018.76 (protocol 2.0)
TCP
443/ssl/http
Open
BusyBox http 1.19.4
TCP
23/telnet?
Open
TCP
80/http
Open
TCP
5000/upnp
Filtered
TCP
515/printer
Open
Lexmark lpd service
TCP
631/http
Open
thttpd
TCP
5900/vnc
Open
Apple remote desktop vnc
TCP
21/ftp
Open
ProFTPD
TCP
25/smtp
Open
Postfix smtpd
TCP
53/domain
Open
ISC BIND none
TCP
106/pop3pw
Open
poppassd
TCP
110/pop3
Open
Dovecot pop3d
TCP
143/imap
Open
Dovecot imapd
TCP
465/ssl/smtp
Open
Postfix smtpd
TCP
587/smtp
Open
Postfix smtpd
TCP
993/ssl/imap
Open
Dovecot imapd
TCP
995/ssl/pop3
Open
Dovecot pop3d
TCP
8443/ssl/https-alt
Open
sw-cp-server
TCP
135/msrpc
Filtered
TCP
139/netbios-ssn
Filtered
TCP
5060/sip
Closed
TCP
111/rpcbind
Open
2 (RPC #100000)
TCP
1723/pptp
Open
MikroTik (Firmware: 1)
TCP
5101/admdog?
Open
TCP
8080/http
Open
nginx
TCP
8888/http
Open
lighttpd 1.4.28
TCP
445/microsoft-ds
Filtered
TCP
554/rtsp?
Open
TCP
2001/dc
Filtered
TCP
3128/squid-http
Filtered
TCP
8081/blackice-icecap
Filtered
TCP
49152/unknown
Open
TCP
8000/http-alt
Filtered
TCP
2000/bandwidth-test
Open
MikroTik bandwidth-test server
TCP
10000/http
Open
MiniServ 1.941 (Webmin httpd)
TCP
113/ident
Closed
TCP
646/ldp
Filtered
TCP
199/smux
Open
Linux SNMP multiplexer
TCP
3389/ms-wbt-server
Open
Microsoft Terminal Services
TCP
1900/upnp
Filtered
TCP
79/finger
Filtered
TCP
9999/abyss
Filtered
Proxies
Anonymizing VPN
No
Tor Exit Node
Yes
Server
No
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
tor4e3.digitale-gesellschaft.ch

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.