Abuse Message [AbuseID:B6FA81:24]: AbuseInfoMail: [Autoreporter 5b44173e-4be2-40c6-86e5-8a95dd629fe2] Summary of your network security incidents (Hetzner)

We have received information regarding spam and/or abuse from ncsc-fi-autoreporter@traficom.fi.

This is an information email only and does not require any further action on your part.
It is your choice whether or not to investigate the complaint.
We do not expect any response.

Information:
NCSC-FI has received information regarding IP-addresses in your network which may have security problems. The information regarding the problems is included as an attachment in CSV format. Data lines have the following format:
asn|ip|source time|domain name|cc|type|uuid|info

Here cc refers to the country code, type to the type of the security problem, and uuid is the unique identifier of the event in Autoreporter. The info column is reserved for any additional information. The column always includes an anonymous identifier for the datasource that is used in the report. All timestamps are given in UTC.

This report is electronically signed using the PGP-key of Autoreporter. The key is available at
https://www.kyberturvallisuuskeskus.fi/sites/default/files/media/file/NCSC-FI_AUTOREPORTER_2019-2024.txt

For more information on the reported events please contact NCSC-FI at cert@traficom.fi.

Network:
— — asn: 24940
— — ip range:

Report:
— — start UTC time: 2022-10-18 06:00:07Z
— — end UTC time: 2022-10-19 06:00:06Z

 
 
——BEGIN PGP SIGNATURE——
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=Ee0F
——END PGP SIGNATURE——



24940|65.108.15.11|2022-10-18 17:50:43Z||FI|bot|050a5ac1-906a-4965-a840-ab2227aabcf8|Datasource: l, Malware: generic/avalanche, C&C Ip: 216.218.135.114, C&C Port: 80, Additional Information: B67-SS-GENERIC, Source Port: 52807
24940|65.108.15.11|2022-10-18 17:45:46Z||FI|bot|4b7e3a72-9cf5-4291-a97e-229e5763f53a|Datasource: b, Malware: avalanche, C&C Ip: 216.218.135.114, C&C Port: 80, Source Port: 63202

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *