199.249.230.68 Fraud Risk

Very high Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 100
100
We consider ​web traffic​ from IP address ​199.249.230.68​ to present a potentially very high fraud risk. This IP address is owned by Quintex Alliance Consulting​​ whose web traffic we consider to present a potentially high​ risk. In both cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server OpenSSH 7.9p1 Raspbian 10 (protocol 2.0) on port 22. Scamalytics see high levels of web traffic from this IP address across our global network, ​almost all of which we suspect to be potentially fraudulent. Considering only the web traffic where we have visibility, we apply a risk score of 100​/100 to 199.249.230.68​, which reflects the proportion of this traffic which we suspect to be potentially fraudulent. If you see web traffic from this IP address there is potentially a very high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk. The device on​ 199.249.230.68 is operating ​a TOR exit node, which could be proxying traffic from another geographical location. The geographical location of 199.249.230.68 is in the United States, however the geographical location of the user could be anywhere in the world.
IP Fraud Risk API
{
  "ip":"199.249.230.68",
  "score":"100",
  "risk":"very high"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname tor45.quintex.com
ASN 62744 - QUINTEX - Quintex Alliance Consulting
ISP Name Quintex Alliance Consulting
Organization Name Quintex Alliance Consulting
Connection type n/a
Location
Country Name United States
Country Code US
Region Texas
City San Angelo
Postal Code 76903
Metro Code n/a
Area Code n/a
Latitude 31.4619
Longitude -100.4400
Port Scan
TCP
80/http
Open
nginx 1.14.0 (Ubuntu)
TCP
443/https
Open
TCP
993/ssl/imaps?
Open
TCP
995/ssl/pop3s?
Open
TCP
1723/pptp
Closed
TCP
7/echo
Closed
TCP
13/daytime
Closed
TCP
26/rsftp
Closed
TCP
37/time
Closed
TCP
88/kerberos-sec
Closed
TCP
106/pop3pw
Closed
TCP
144/news
Closed
TCP
389/ldap
Closed
TCP
544/kshell
Closed
TCP
631/ipp
Closed
TCP
873/rsync
Closed
TCP
1027/IIS
Closed
TCP
1028/unknown
Closed
TCP
1029/ms-lsa
Closed
TCP
3000/ppp
Closed
TCP
3986/mapper-ws_ethd
Closed
TCP
5051/ida-agent
Closed
TCP
5800/vnc-http
Closed
TCP
6000/X11
Closed
TCP
6001/X11:1
Closed
TCP
6646/unknown
Closed
TCP
8000/http-alt
Closed
TCP
49152/unknown
Closed
TCP
49153/unknown
Closed
TCP
49154/unknown
Closed
TCP
25/smtp
Filtered
TCP
22/ssh
Open
OpenSSH 7.9p1 Raspbian 10 (protocol 2.0)
TCP
21/ftp
Open
MikroTik router ftpd 7.3.1
TCP
23/telnet
Filtered
TCP
2000/bandwidth-test
Open
MikroTik bandwidth-test server
TCP
3389/ms-wbt-server?
Open
TCP
49157/unknown
Closed
TCP
32768/filenet-tms
Closed
TCP
49155/unknown
Closed
TCP
49156/unknown
Closed
TCP
646/ldp
Filtered
TCP
465/smtps
Filtered
TCP
587/submission
Filtered
TCP
135/msrpc
Filtered
TCP
444/ssl/snpp?
Open
Proxies
Anonymizing VPN
No
Tor Exit Node
Yes
Server
No
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
tor45.quintex.com

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.