46.22.209.171 Fraud Risk

Medium Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 50
100
IP address ​​46.22.209.171 is operated by ​Wavecom whose ​​web traffic we consider to present a potentially medium​ fraud risk. This IP address is owned by ​​Aktsiaselts WaveCom whose web traffic we also consider to present a potentially high fraud risk. In both cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the proxy server ​Squid http proxy 3.5.27 on port 8081. Scamalytics see very high levels of traffic from Wavecom across our global network, ​some of which we suspect to be potentially fraudulent. We have no visibility into the web traffic directly from ​46.22.209.171​, and therefore apply a risk score of ​50​/100 based on the overall risk from ​Wavecom​’s IP addresses where we do have visibility. 46.22.209.171 is not a standard domestic connection, it is a commercial server which could be proxying traffic from another geographical location. The geographical location of 46.22.209.171 is in Estonia, however the geographical location of the user could be anywhere in the world.
IP Fraud Risk API
{
  "ip":"46.22.209.171",
  "score":"50",
  "risk":"medium"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname n/a
ASN 34702 - WAVECOM-AS
ISP Name Aktsiaselts WaveCom
Organization Name Wavecom
Connection type n/a
Location
Country Name Estonia
Country Code EE
Region Harjumaa
City Tallinn
Postal Code n/a
Metro Code n/a
Area Code n/a
Latitude 59.4370
Longitude 24.7536
Port Scan
TCP
1723/pptp
Open
Microsoft
TCP
25/smtp
Filtered
TCP
53/domain
Filtered
TCP
135/msrpc
Filtered
TCP
139/netbios-ssn
Filtered
TCP
445/microsoft-ds
Filtered
TCP
8080/http-proxy
Filtered
TCP
5060/tcpwrapped
Open
TCP
80/http
Filtered
TCP
443/https
Filtered
TCP
646/ldp
Filtered
TCP
5000/http
Open
nginx
TCP
113/ident
Closed
TCP
22/ssh
Filtered
TCP
1720/h323q931
Filtered
TCP
2000/bandwidth-test
Open
MikroTik bandwidth-test server
TCP
6000/X11?
Open
TCP
6001/X11:1
Filtered
TCP
21/ftp
Open
ProFTPD or KnFTPD
TCP
110/pop3
Open
Dovecot pop3d
TCP
143/imap
Open
Dovecot imapd
TCP
465/ssl/smtp
Open
Exim smtpd 4.94.2
TCP
587/smtp
Open
Exim smtpd 4.94.2
TCP
993/ssl/imap
Open
Dovecot imapd
TCP
995/ssl/pop3
Open
Dovecot pop3d
TCP
3306/mysql
Closed
TCP
5432/postgresql
Closed
TCP
111/tcpwrapped
Open
TCP
199/tcpwrapped
Open
TCP
8081/http-proxy
Open
Squid http proxy 3.5.27
TCP
23/tcpwrapped
Open
TCP
990/ssl/ftp
Open
FileZilla ftpd
TCP
2001/dc
Filtered
TCP
2049/nfs
Filtered
TCP
2121/ccproxy-ftp
Filtered
TCP
2717/pn-requester
Filtered
TCP
3000/ppp
Filtered
TCP
49152/unknown
Closed
TCP
49153/unknown
Closed
TCP
49154/unknown
Closed
TCP
49155/unknown
Closed
TCP
49156/unknown
Closed
TCP
49157/unknown
Closed
TCP
179/tcpwrapped
Open
TCP
81/hosts2-ns
Closed
TCP
88/kerberos-sec?
Open
Proxies
Anonymizing VPN
No
Tor Exit Node
No
Server
Yes
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
n/a

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.