41.66.199.225 Fraud Risk

High Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 76
100
IP address 41.66.199.225 is operated by Vodafone Ghana whose web traffic we consider to present a potentially high fraud risk. Non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the proxy server Squid http proxy 3.5.20 on port 8081, as well as the SSH server Dropbear sshd 2020.81 (protocol 2.0) on port 22. Scamalytics see high levels of traffic from Vodafone Ghana across our global network, most of which we suspect to be potentially fraudulent. We have no visibility into the web traffic directly from 41.66.199.225, and therefore apply a risk score of 76/100 based on the overall risk from Vodafone Ghana’s IP addresses where we do have visibility. If you see web traffic from this IP address there is potentially a high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk.
IP Fraud Risk API
{
  "ip":"41.66.199.225",
  "score":"76",
  "risk":"high"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname n/a
ASN 29614 - GHANATEL-AS
ISP Name Vodafone Ghana
Organization Name n/a
Connection type wireless
Location
Country Name Ghana
Country Code GH
Region Greater Accra
City Accra
Postal Code n/a
Metro Code n/a
Area Code n/a
Latitude 5.6037
Longitude -0.1870
Port Scan
TCP
25/smtp
Filtered
TCP
646/ldp
Filtered
TCP
80/http
Open
nginx/
TCP
443/ssl/https
Open
nginx/
TCP
993/ssl/imaps?
Open
TCP
995/ssl/pop3s?
Open
TCP
1723/pptp
Closed
TCP
22/ssh
Open
Dropbear sshd 2020.81 (protocol 2.0)
TCP
23/telnet
Filtered
TCP
139/netbios-ssn
Filtered
TCP
445/microsoft-ds
Filtered
TCP
135/msrpc
Filtered
TCP
1433/ms-sql-s
Open
Microsoft SQL Server 2014 12.00.2000
TCP
3306/mysql
Filtered
TCP
3389/ms-wbt-server
Filtered
TCP
3128/http-proxy
Open
Squid http proxy
TCP
8080/http-proxy?
Open
TCP
8081/http-proxy
Open
Squid http proxy 3.5.20
TCP
8443/https-alt?
Open
TCP
2000/bandwidth-test
Open
MikroTik bandwidth-test server
TCP
514/shell?
Open
TCP
554/rtsp
Open
Apple AirTunes rtspd
TCP
32768/filenet-tms
Closed
TCP
49152/unknown
Closed
TCP
49153/unknown
Closed
TCP
49154/unknown
Closed
TCP
49155/unknown
Closed
TCP
49156/unknown
Closed
TCP
49157/unknown
Closed
TCP
1900/upnp
Filtered
TCP
111/rpcbind
Open
2-4 (RPC #100000)
TCP
444/ssl/snpp?
Open
Proxies
Anonymizing VPN
No
Tor Exit Node
No
Server
No
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
n/a

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.