196.245.181.105 Fraud Risk

High Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 57
100
IP address ​​196.245.181.105 is operated by ​Fiber Grid whose ​​web traffic we consider to present a potentially high​ fraud risk. This IP address is owned by ​​Packet Exchange Limited whose web traffic we also consider to present a potentially high fraud risk. In both cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) on port 3389. Scamalytics see high levels of traffic from Fiber Grid across our global network, ​some of which we suspect to be potentially fraudulent. We have no visibility into the web traffic directly from ​196.245.181.105​, and therefore apply a risk score of ​57​/100 based on the overall risk from ​Fiber Grid​’s IP addresses where we do have visibility. If you see web traffic from this IP address there is potentially a high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk. The device on​ 196.245.181.105 is operating ​an anonymising VPN, which could be proxying traffic from another geographical location. The geographical location of 196.245.181.105 is in Poland, however the geographical location of the user could be anywhere in the world.
IP Fraud Risk API
{
  "ip":"196.245.181.105",
  "score":"57",
  "risk":"high"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname n/a
ASN 41564 - AS41564
ISP Name Packet Exchange Limited
Organization Name Fiber Grid
Connection type fttx
Location
Country Name Poland
Country Code PL
Region Mazovia
City Warsaw
Postal Code n/a
Metro Code n/a
Area Code n/a
Latitude 52.2297
Longitude 21.0122
Port Scan
TCP
139/netbios-ssn
Filtered
TCP
3389/ssh
Open
OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0)
TCP
179/bgp
Filtered
TCP
25/smtp
Filtered
TCP
22/tcpwrapped
Open
TCP
53/domain
Closed
TCP
80/http
Open
nginx 1.10.3 (Ubuntu)
TCP
113/ident
Closed
TCP
443/https
Closed
TCP
2000/bandwidth-test
Open
MikroTik bandwidth-test server
TCP
1723/pptp
Open
linux (Firmware: 1)
TCP
21/ftp
Open
FileZilla ftpd
TCP
143/imap
Open
Microsoft Exchange 2007-2010 imapd
TCP
8080/http
Open
Jetty 9.2.14.v20151106
TCP
49152/msrpc
Open
Microsoft Windows RPC
TCP
49153/msrpc
Open
Microsoft Windows RPC
TCP
49154/msrpc
Open
Microsoft Windows RPC
TCP
49155/msrpc
Open
Microsoft Windows RPC
TCP
49156/unknown
Closed
TCP
49157/unknown
Closed
TCP
554/rtsp
Open
TCP
111/rpcbind
Open
2-4 (RPC #100000)
TCP
445/microsoft-ds
Filtered
TCP
135/msrpc
Filtered
TCP
548/afp
Filtered
TCP
587/submission
Filtered
TCP
5101/admdog
Filtered
TCP
5190/aol
Filtered
TCP
5357/wsdapi
Filtered
TCP
5432/postgresql
Filtered
TCP
5631/pcanywheredata
Filtered
TCP
5666/nrpe
Filtered
TCP
5800/vnc-http
Filtered
TCP
5900/vnc
Filtered
TCP
6000/X11
Filtered
TCP
6001/X11:1
Filtered
TCP
6646/unknown
Filtered
TCP
7070/realserver
Filtered
TCP
8000/http-alt
Filtered
TCP
8008/http
Filtered
TCP
8009/ajp13
Filtered
TCP
8081/blackice-icecap
Filtered
Proxies
Anonymizing VPN
Yes
Tor Exit Node
No
Server
No
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
n/a

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.