Abuse Message [AbuseID:B6F493:1E]: AbuseInfoMail: [Autoreporter 2e63bbcd-21a4-4847-b23c-f2db9408f72a] Summary of your network security incidents (Hetzner)

We have received information regarding spam and/or abuse from ncsc-fi-autoreporter@traficom.fi.

This is an information email only and does not require any further action on your part.
It is your choice whether or not to investigate the complaint.
We do not expect any response.

Information:
NCSC-FI has received information regarding IP-addresses in your network which may have security problems. The information regarding the problems is included as an attachment in CSV format. Data lines have the following format:
asn|ip|source time|domain name|cc|type|uuid|info

Here cc refers to the country code, type to the type of the security problem, and uuid is the unique identifier of the event in Autoreporter. The info column is reserved for any additional information. The column always includes an anonymous identifier for the datasource that is used in the report. All timestamps are given in UTC.

This report is electronically signed using the PGP-key of Autoreporter. The key is available at
https://www.kyberturvallisuuskeskus.fi/sites/default/files/media/file/NCSC-FI_AUTOREPORTER_2019-2024.txt

For more information on the reported events please contact NCSC-FI at cert@traficom.fi.

Network:
— — asn: 24940
— — ip range:

Report:
— — start UTC time: 2022-11-05 07:00:07Z
— — end UTC time: 2022-11-06 07:00:08Z

 
 
——BEGIN PGP SIGNATURE——
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=6iy3
——END PGP SIGNATURE——



24940|65.108.15.11|2022-11-05 15:05:48Z||FI|bot|9c601b34-dd6c-4838-87c9-095b6793dd46|Datasource: l, Malware: tinba, C&C Ip: 216.218.185.162, C&C Port: 80, Additional Information: B67-SS-TINBA, Source Port: 58123
24940|65.108.15.11|2022-11-05 15:00:56Z||FI|bot|a0d631ae-f1ec-4ebe-b03a-4e9727719519|Datasource: b, Malware: tinba, C&C Ip: 216.218.185.162, C&C Port: 80, Source Port: 63083

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *