Abuse Message [AbuseID:B6F7D5:2D]: AbuseInfoMail: [Autoreporter e3cb189c-242f-4d44-afcf-218b2ef9b1e6] Summary of your network security incidents (Hetzner)

We have received information regarding spam and/or abuse from ncsc-fi-autoreporter@traficom.fi.

This is an information email only and does not require any further action on your part.
It is your choice whether or not to investigate the complaint.
We do not expect any response.

Information:
NCSC-FI has received information regarding IP-addresses in your network which may have security problems. The information regarding the problems is included as an attachment in CSV format. Data lines have the following format:
asn|ip|source time|domain name|cc|type|uuid|info

Here cc refers to the country code, type to the type of the security problem, and uuid is the unique identifier of the event in Autoreporter. The info column is reserved for any additional information. The column always includes an anonymous identifier for the datasource that is used in the report. All timestamps are given in UTC.

This report is electronically signed using the PGP-key of Autoreporter. The key is available at
https://www.kyberturvallisuuskeskus.fi/sites/default/files/media/file/NCSC-FI_AUTOREPORTER_2019-2024.txt

For more information on the reported events please contact NCSC-FI at cert@traficom.fi.

Network:
— — asn: 24940
— — ip range:

Report:
— — start UTC time: 2022-10-27 06:00:06Z
— — end UTC time: 2022-10-28 06:00:07Z

 
 
——BEGIN PGP SIGNATURE——
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=JFjG
——END PGP SIGNATURE——



24940|65.108.15.11|2022-10-27 17:51:02Z||FI|bot|0a556b37-1208-4281-8fd3-c33b5a2f7780|Datasource: l, Malware: tinba, C&C Ip: 216.218.185.162, C&C Port: 80, Additional Information: B67-SS-TINBA, Source Port: 63914
24940|65.108.15.11|2022-10-27 17:51:02Z||FI|bot|d8055700-019d-4dbc-9bdf-8fe37544380e|Datasource: b, Malware: tinba, C&C Ip: 216.218.185.162, C&C Port: 80, Source Port: 63914

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *