Abuse Message [AbuseID:B6F5AB:1F]: AbuseInfoMail: [Autoreporter b8d29a1a-106a-42df-94ab-dd09aed1cfb9] Summary of your network security incidents (Hetzner)

We have received information regarding spam and/or abuse from ncsc-fi-autoreporter@traficom.fi.

This is an information email only and does not require any further action on your part.
It is your choice whether or not to investigate the complaint.
We do not expect any response.

Information:
NCSC-FI has received information regarding IP-addresses in your network which may have security problems. The information regarding the problems is included as an attachment in CSV format. Data lines have the following format:
asn|ip|source time|domain name|cc|type|uuid|info

Here cc refers to the country code, type to the type of the security problem, and uuid is the unique identifier of the event in Autoreporter. The info column is reserved for any additional information. The column always includes an anonymous identifier for the datasource that is used in the report. All timestamps are given in UTC.

This report is electronically signed using the PGP-key of Autoreporter. The key is available at
https://www.kyberturvallisuuskeskus.fi/sites/default/files/media/file/NCSC-FI_AUTOREPORTER_2019-2024.txt

For more information on the reported events please contact NCSC-FI at cert@traficom.fi.

Network:
— — asn: 24940
— — ip range:

Report:
— — start UTC time: 2022-11-02 07:00:06Z
— — end UTC time: 2022-11-03 07:00:08Z

 
 
——BEGIN PGP SIGNATURE——
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=BMJC
——END PGP SIGNATURE——



24940|65.108.15.11|2022-11-02 19:22:59Z||FI|bot|037cb934-9949-4ccc-bad3-c83182c88ba2|Datasource: l, Malware: tinba, C&C Ip: 216.218.185.162, C&C Port: 80, Additional Information: B67-SS-TINBA, Source Port: 55478
24940|65.108.15.11|2022-11-02 19:22:58Z||FI|bot|73f9915e-44c9-44dc-9ccd-e0dba3ccb736|Datasource: b, Malware: tinba, C&C Ip: 216.218.185.162, C&C Port: 80, Source Port: 55449

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *