• Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Critical Infrastructure
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard
  • Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Critical Infrastructure
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard

RESEARCH & INSIGHTS CENTER

Ransomware Attack Against U.S. Public Housing Authority Linked to Previous Attacks

Ransomware Attack Against U.S. Public Housing Authority Linked to Previous Attacks

Prepared By: Dr. Robert Ames, Staff Threat Researcher

Executive Summary

  • On January 3, local media reported that a major U.S. city’s housing authority had suffered a ransomware attack.

  • The LockBit ransomware group, which has made false claims in the past, took responsibility for the incident.

  • As of this publication, the housing authority has announced a disruption, but has not elaborated on the nature of the event.

  • Despite the LockBit group’s previous false claims, SecurityScorecard assesses with moderate confidence that the organization in question did in fact suffer a ransomware attack.

Background

On January 2, the LockBit ransomware group added an entry for a major U.S. city’s housing authority to its data leak site, claiming to have exfiltrated 15 TB of data from its systems during the attack.

Image 1: SecurityScorecard’s ratings platform reports the LockBit group’s January 2 claim to have breached the housing authority in question.

The affected organization has advised citizens that it is experiencing “technical difficulties” and warned of the possibility of resulting service disruptions, but has not acknowledged LockBit’s claims. While LockBit is a relatively long-standing ransomware group, it has recently made false claims regarding its attacks, which may, at first glance, call this recent claim into question.

Despite the group’s recent history of making questionable claims regarding its attacks, its affiliates remain willing and able to mount actual attacks, including a December incident that disrupted the operations of the Hospital for Sick Children (SickKids) in Toronto, Canada, for which the group apologized. Similarly, the SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team’s investigation into the more recent housing authority attack suggests that it did in fact suffer a ransomware attack, despite the LockBit group’s previous false claims.

The group’s claim, moreover, comes alongside other evidence that ransomware groups have targeted housing authorities: on January 23, another local housing authority disclosed that a previously unconfirmed ransomware attack in September 2022 had exposed the personally identifiable information of over 200,000 people.

Findings

Following LockBit’s claim, STRIKE consulted internal and external data sources to identify evidence of a compromise affecting the housing authority. Data reflecting traffic to and from vulnerable IP addresses belonging to the affected organization indicates that they exchanged data with IP addresses previously observed conducting malicious activity. This data includes communication with IP addresses also observed communicating with previous ransomware victims and repeated and large data transfers that may reflect exfiltration by the attackers.

Researchers collected traffic data for eight IP addresses that SecurityScorecard’s ratings platform attributes to the housing authority; its Digital Footprint contains 319 IP addresses, so researchers limited their query to those addresses where SecurityScorecard also detected issues affecting the organization’s rating. Prioritizing those IP addresses where our ratings platform observes issues helped researchers focus their investigation upon the assets threat actors are more likely to target (attackers could begin their efforts by focusing on exploiting the observed issues and vulnerabilities). They additionally focused their query on a two-month period leading up to January 2 (the day LockBit published its claim on its leak site). This yielded 27,759 flows involving 607 IP addresses from outside the housing authority’s network.

Findings: Possible Exploitation of Known Vulnerability and Deployment of Remote Access Software

Two IP addresses other cybersecurity vendors have linked to malicious activity merit attention due to the frequency with which they communicated with a housing authority IP address. The first such IP address, 159.65.216[.]150, appeared in almost a fifth of all flows within the dataset. It and a single housing authority IP address exchanged data 5,904 times between November 2 and December 30. One vendor has linked this IP address to malicious activity. A domain linked to phishing and other malicious activity resolved to it as recently as December 30. Two malicious files communicate with it, and members of the VirusTotal community have linked it to exploitation of CVE-2022-30190, a Microsoft Support Diagnostic Tool (MSDT) vulnerability also known as Follina. Threat actors have leveraged Follina to distribute malware, including the Rozena backdoor,AsyncRAT (remote access trojan), and Qbot, which has previously delivered ransomware as a later-stage payload. SecurityScorecard’s ratings platform observed an outdated version of Windows running at the housing authority IP address involved in this traffic. It is possible that Follina still affected the version observed because a user had not yet applied the relevant update and attackers exploited it to drop information-stealing malware to the affected device, with the thousands of transfers observed reflecting the operation of that malware.

The second such IP address, 173.199.15[.]254, exchanged data with a single housing authority IP address 2,896 times between November 2 and January 2. SecurityScorecard has previously observed this IP address communicating with other ransomware victims. This communication likely reflects the remote access software attackers could have used to deploy ransomware.

Remote access software company LogMeIn, Inc. is the organization that operates 173.199.15[.]254. While the software has many legitimate uses, threat actors often induce their targets to install legitimate remote access software (TeamViewer is especially common) on their devices as a means of granting control of the device to the attacker, which can facilitate the deployment of ransomware. Traffic from a victim network to a LogMeIn-operated IP address may therefore reflect the attacker’s use of LogMeIn to control a victim device. In addition to vendors’ links to malware, members of the wider cybersecurity community have included 167.172.240[.]54 in collections referring to “remote IPs,” which may indicate that they have observed it attempting to access target systems remotely in other incidents, just as the STRIKE Team observed it communicating with previous ransomware victims.

Findings: Other Links to Previous Ransomware Attacks

Of the 607 IP addresses observed communicating with the housing authority in the sample period, 157 appeared in traffic samples the STRIKE Team collected from previous ransomware victims. This may suggest that those 157 IP addresses may have been involved in the attack, given that they also appeared in traffic collections from other ransomware victims. Moreover, of these IP addresses, other cybersecurity vendors have already linked twenty-eight to malicious activity, indicating that they are especially likely to have been part of the compromise. Both groups of IP addresses (those observed communicating with previous ransomware victims and those detected as malicious by other cybersecurity vendors) are available in the appendices below.

Additionally, a collection of related files that vendors have deemed malicious have communicated with forty of the IP addresses that also communicated with both the housing authority and previous ransomware victims. Communication between housing authority assets and these IP addresses may therefore reflect the use of malware within the housing authority’s network. The words “Ramnit” and “Hupigon” appear particularly frequently in the communicating files’ detections. Ramnit and Hupigon are both long-standing trojans that can facilitate data theft and the delivery of additional malware. Either could have been involved in the theft of credentials attackers later reused to access the housing authority’s system, but researchers have also observed Ramnit delivering ransomware as a second-stage payload, which communication with these IP addresses could also reflect. However, the traffic could also reflect the theft of credentials and other data or the delivery of a second-stage payload that enables the theft (rather than encryption) of victim data.

Findings: Possible Exfiltration

Of the 617 IP addresses with which the housing authority IP addresses communicated, other vendors have linked 114 to malicious activity. Of the traffic involving that more limited group, traffic to eighteen not previously discussed is likely to reflect exfiltration of housing authority data. This traffic involved large transfers of data most of these flows transferred 12.28 MB from a single housing authority IP address to these possibly malicious IP addresses. All vendor-detected IP addresses involved belong to either DigitalOcean or Rackspace (eighteen to DigitalOcean and one to Rackspace). Threat actors often abuse these hosting provider-owned IP addresses and members of the VirusTotal community have specifically linked one, 137.184.148[.]2, to ransomware–it has served downloads of a file that appears in a VirusTotal community graph titled “RU Ransomware Node Map.” Given their vendor detections and the size of the data transfers involved, traffic involving these IP addresses may suggest that this traffic reflects the exfiltration of data from the housing authority. However, it is also possible that large data transfers to and from provider assets could easily reflect more benign behavior like transfers to and from backups. Without internal visibility into the housing authority’s network, STRIKE cannot confirm if this was exfiltration, but the organization should have SIEM logs that describe these flows and can offer further insights. These IP addresses are also available in an appendix below.

Conclusion

While some commentators have noted a downward trend in the total number of ransomware attacks over the past year, the recent confirmation of a previous attack against another local housing authority suggests that local governments are still targets for ransomware groups, even if the overall number of successful attacks has been trending downward. Similarly, the available traffic data suggests that the housing authority in this more recent incident also suffered a ransomware attack. Not only did it communicate with the same IP addresses as previous ransomware victims in the months leading up to the attack, but the available traffic data also suggests a number of possible avenues by which an attacker like the LockBit group could have accessed their systems. Other researchers have linked one IP address that communicated regularly with a housing authority asset where SecurityScorecard observed an outdated (and possibly vulnerable) operating system in use to the exploitation of a vulnerability known to affect that operating system. Previous research has linked exploitation of this vulnerability to the distribution of malware that can facilitate data theft and the delivery of ransomware. Another IP address that frequently communicated with this same vulnerable IP address reflects the use of remote access software that attackers may have used against previous ransomware victims. Finally, a series of large data transfers leading up to the LockBit group’s addition of the organization to its data leak site may reflect theft of the data the group claims to have stolen. Based on this evidence, and despite the LockBit group’s previous false claims, SecurityScorecard assesses with moderate confidence that the organization in question did suffer a ransomware attack, which may in turn indicate that LockBit can pose a threat to both the private and public sectors even while researchers anticipate its demise.
Appendix: IP Addresses Communicating with Previous Ransomware Victims
  • 186[.]237[.]182[.]227

  • 103[.]170[.]83[.]200

  • 89[.]203[.]251[.]217

  • 103[.]92[.]28[.]58

  • 103[.]131[.]95[.]88

  • 154[.]68[.]199[.]18

  • 104[.]131[.]0[.]131

  • 146[.]20[.]132[.]166

  • 192[.]241[.]157[.]60

  • 159[.]203[.]152[.]67

  • 157[.]245[.]70[.]89

  • 146[.]20[.]128[.]141

  • 146[.]20[.]128[.]74

  • 146[.]20[.]128[.]192

  • 159[.]89[.]246[.]130

  • 146[.]20[.]128[.]197

  • 146[.]20[.]132[.]69

  • 23[.]253[.]41[.]115

  • 146[.]20[.]128[.]108

  • 146[.]20[.]132[.]67

  • 146[.]20[.]128[.]46

  • 146[.]20[.]128[.]82

  • 157[.]230[.]89[.]169

  • 146[.]20[.]132[.]139

  • 206[.]81[.]3[.]80

  • 146[.]20[.]128[.]164

  • 162[.]13[.]161[.]130

  • 82[.]202[.]70[.]139

  • 159[.]65[.]196[.]12

  • 178[.]128[.]135[.]232

  • 143[.]198[.]114[.]225

  • 157[.]230[.]85[.]253

  • 69[.]20[.]43[.]192

  • 165[.]227[.]204[.]179

  • 23[.]253[.]31[.]170

  • 167[.]99[.]116[.]82

  • 157[.]230[.]54[.]161

  • 134[.]213[.]193[.]62

  • 157[.]245[.]241[.]7

  • 146[.]20[.]128[.]178

  • 159[.]65[.]235[.]198

  • 146[.]20[.]132[.]153

  • 206[.]189[.]180[.]223

  • 64[.]185[.]181[.]238

  • 192[.]33[.]214[.]47

  • 137[.]184[.]201[.]253

  • 192[.]33[.]96[.]102

  • 195[.]176[.]26[.]206

  • 134[.]213[.]70[.]247

  • 137[.]184[.]71[.]88

  • 159[.]203[.]145[.]121

  • 192[.]241[.]241[.]96

  • 146[.]20[.]128[.]147

  • 145[.]40[.]89[.]200

  • 45[.]232[.]73[.]54

  • 146[.]20[.]128[.]155

  • 45[.]90[.]111[.]243

  • 146[.]20[.]132[.]70

  • 146[.]20[.]132[.]205

  • 146[.]20[.]128[.]107

  • 146[.]20[.]132[.]71

  • 146[.]20[.]132[.]72

  • 146[.]20[.]128[.]75

  • 131[.]108[.]156[.]1

  • 45[.]175[.]101[.]66

  • 146[.]20[.]128[.]169

  • 192[.]241[.]145[.]39

  • 103[.]28[.]156[.]170

  • 143[.]244[.]220[.]80

  • 185[.]14[.]184[.]154

  • 146[.]20[.]32[.]58

  • 35[.]212[.]200[.]165

  • 146[.]20[.]128[.]175

  • 161[.]47[.]17[.]28

  • 38[.]43[.]193[.]211

  • 157[.]245[.]81[.]154

  • 173[.]233[.]161[.]109

  • 38[.]43[.]199[.]234

  • 162[.]209[.]40[.]62

  • 146[.]20[.]132[.]132

  • 146[.]190[.]223[.]184

  • 142[.]93[.]9[.]247

  • 45[.]55[.]58[.]103

  • 168[.]167[.]72[.]179

  • 146[.]20[.]132[.]78

  • 72[.]3[.]137[.]178

  • 104[.]131[.]48[.]134

  • 193[.]5[.]60[.]8

  • 146[.]20[.]128[.]47

  • 146[.]20[.]128[.]83

  • 146[.]20[.]132[.]39

  • 184[.]106[.]10[.]77

  • 146[.]20[.]128[.]66

  • 146[.]20[.]128[.]151

  • 159[.]203[.]41[.]221

  • 63[.]131[.]135[.]115

  • 67[.]192[.]28[.]17

  • 159[.]89[.]188[.]11

  • 72[.]32[.]131[.]23

  • 159[.]65[.]221[.]212

  • 167[.]71[.]87[.]161

  • 146[.]190[.]219[.]246

  • 184[.]106[.]60[.]185

  • 159[.]223[.]167[.]67

  • 23[.]160[.]192[.]118

  • 206[.]189[.]180[.]179

  • 147[.]182[.]218[.]51

  • 137[.]184[.]135[.]187

  • 67[.]205[.]128[.]102

  • 146[.]190[.]219[.]244

  • 198[.]199[.]86[.]237

  • 161[.]35[.]102[.]197

  • 50[.]57[.]31[.]206

  • 130[.]60[.]204[.]10

  • 159[.]223[.]138[.]235

  • 103[.]110[.]98[.]174

  • 173[.]199[.]15[.]254

  • 146[.]20[.]132[.]179

  • 167[.]172[.]231[.]60

  • 178[.]128[.]55[.]198

  • 35[.]212[.]198[.]217

  • 146[.]20[.]128[.]138

  • 146[.]20[.]128[.]144

  • 146[.]20[.]128[.]87

  • 159[.]203[.]123[.]152

  • 146[.]20[.]132[.]161

  • 159[.]89[.]102[.]253

  • 98[.]129[.]164[.]22

  • 35[.]210[.]239[.]72

  • 146[.]20[.]128[.]162

  • 35[.]214[.]223[.]115

  • 50[.]57[.]205[.]124

  • 173[.]203[.]158[.]113

  • 174[.]143[.]40[.]29

  • 146[.]20[.]132[.]154

  • 138[.]197[.]225[.]96

  • 134[.]209[.]118[.]223

  • 35[.]210[.]214[.]151

  • 89[.]203[.]250[.]36

  • 146[.]190[.]72[.]74

  • 35[.]214[.]236[.]176

  • 146[.]20[.]132[.]192

  • 72[.]32[.]100[.]43

  • 173[.]203[.]164[.]184

  • 146[.]20[.]128[.]153

  • 63[.]131[.]135[.]96

  • 50[.]56[.]23[.]157

  • 35[.]212[.]212[.]222

  • 35[.]212[.]217[.]28

  • 35[.]212[.]211[.]70

  • 35[.]212[.]133[.]238

  • 146[.]20[.]161[.]1

  • 72[.]32[.]236[.]222

  • 184[.]106[.]54[.]1

  • 173[.]203[.]187[.]1

  • 162[.]209[.]117[.]196

  • 162[.]13[.]192[.]130

Appendix: Vendor-Detected IP Addresses
  • 89[.]203[.]251[.]217

  • 45[.]232[.]73[.]54

  • 38[.]43[.]193[.]211

  • 178[.]128[.]55[.]198

  • 206[.]189[.]130[.]158

  • 206[.]189[.]139[.]206

  • 198[.]199[.]93[.]44

  • 157[.]245[.]81[.]154

  • 107[.]170[.]246[.]28

  • 178[.]62[.]64[.]242

  • 192[.]241[.]206[.]53

  • 157[.]245[.]240[.]224

  • 192[.]241[.]145[.]39

  • 204[.]48[.]16[.]71

  • 192[.]241[.]197[.]125

  • 173[.]233[.]161[.]109

  • 45[.]232[.]73[.]57

  • 192[.]241[.]196[.]158

  • 168[.]167[.]72[.]179

  • 162[.]243[.]139[.]19

  • 104[.]236[.]128[.]11

  • 159[.]203[.]240[.]10

  • 107[.]170[.]235[.]15

  • 167[.]99[.]7[.]23

  • 168[.]167[.]72[.]97

  • 192[.]241[.]210[.]182

  • 139[.]59[.]181[.]152

  • 137[.]184[.]60[.]119

  • 198[.]199[.]116[.]78

  • 137[.]184[.]149[.]253

  • 134[.]209[.]118[.]223

  • 104[.]131[.]0[.]222

  • 103[.]131[.]95[.]88

  • 103[.]239[.]252[.]66

  • 198[.]199[.]119[.]170

  • 139[.]59[.]165[.]170

  • 24[.]199[.]92[.]95

  • 137[.]184[.]58[.]169

  • 104[.]236[.]128[.]18

  • 68[.]183[.]239[.]110

  • 167[.]99[.]87[.]194

  • 159[.]223[.]167[.]67

  • 103[.]92[.]28[.]58

  • 167[.]99[.]115[.]182

  • 161[.]35[.]205[.]87

  • 206[.]189[.]229[.]81

  • 45[.]55[.]45[.]210

  • 64[.]227[.]24[.]23

  • 45[.]232[.]73[.]35

  • 162[.]243[.]131[.]5

  • 192[.]241[.]202[.]200

  • 157[.]230[.]226[.]26

  • 142[.]93[.]9[.]247

  • 128[.]199[.]92[.]153

  • 64[.]225[.]124[.]42

  • 192[.]241[.]197[.]61

  • 134[.]209[.]97[.]150

  • 146[.]190[.]76[.]162

  • 146[.]20[.]132[.]132

  • 139[.]59[.]12[.]104

  • 198[.]148[.]92[.]176

  • 143[.]198[.]208[.]71

  • 137[.]184[.]148[.]2

  • 159[.]223[.]112[.]213

  • 165[.]22[.]177[.]53

  • 167[.]172[.]145[.]161

  • 134[.]209[.]212[.]251

  • 68[.]183[.]24[.]222

  • 144[.]126[.]232[.]151

  • 138[.]68[.]107[.]18

  • 89[.]203[.]250[.]36

  • 170[.]233[.]117[.]110

  • 206[.]189[.]180[.]223

  • 116[.]90[.]227[.]242

  • 68[.]183[.]88[.]253

  • 174[.]138[.]79[.]19

  • 167[.]172[.]73[.]5

  • 146[.]190[.]219[.]152

  • 154[.]68[.]199[.]18

  • 45[.]55[.]64[.]46

  • 143[.]244[.]202[.]121

  • 102[.]220[.]15[.]219

  • 102[.]220[.]15[.]104

  • 200[.]50[.]249[.]222

  • 104[.]248[.]6[.]235

  • 191[.]37[.]28[.]117

  • 173[.]203[.]187[.]1

  • 72[.]32[.]131[.]23

  • 157[.]245[.]241[.]7

  • 134[.]209[.]120[.]236

  • 137[.]184[.]201[.]253

  • 159[.]203[.]94[.]125

  • 134[.]209[.]172[.]238

  • 157[.]245[.]97[.]223

  • 178[.]128[.]135[.]232

  • 104[.]131[.]100[.]255

  • 146[.]20[.]132[.]192

  • 45[.]58[.]138[.]186

  • 146[.]190[.]248[.]226

  • 131[.]108[.]156[.]1

  • 165[.]22[.]176[.]62

  • 38[.]43[.]199[.]234

  • 206[.]189[.]180[.]179

  • 167[.]71[.]91[.]220

  • 159[.]65[.]49[.]110

  • 104[.]236[.]116[.]147

  • 165[.]232[.]182[.]249

  • 102[.]220[.]13[.]85

  • 131[.]108[.]156[.]113

  • 192[.]241[.]212[.]178

  • 173[.]199[.]15[.]254

  • 159[.]65[.]216[.]150

  • 196[.]10[.]52[.]57

  • 165[.]232[.]104[.]83

Appendix: Vendor-Detected IP Addresses Involved in Large Data Transfers
  • 134[.]209[.]118[.]223

  • 64[.]227[.]24[.]23

  • 157[.]230[.]226[.]26

  • 128[.]199[.]92[.]153

  • 137[.]184[.]148[.]2

  • 159[.]223[.]112[.]213

  • 165[.]22[.]177[.]53

  • 144[.]126[.]232[.]151

  • 206[.]189[.]180[.]223

  • 146[.]190[.]219[.]152

  • 143[.]244[.]202[.]121

  • 173[.]203[.]187[.]1

  • 157[.]245[.]241[.]7

  • 134[.]209[.]120[.]236

  • 137[.]184[.]201[.]253

  • 146[.]190[.]248[.]226

  • 206[.]189[.]180[.]179

  • 159[.]65[.]216[.]150

  • 165[.]232[.]104[.]83

Related articles

Don’t Fight Alone Incident Response Template

Incident Response Template Download this free template for outlining the steps SecurityScorecard will take alongside you in the event of

Read More »
03/24/2023
reduce cyber risk report
Cyber Insurance

Protected: Reduce Cyber Risk with the predictive power of security ratings

There is no excerpt because this is a protected post.

Read More »
03/21/2023

Case Study: UNICC

As one of Japan’s leading networking and security technology integrators, Network Value Components (NVC) is responsible for provisioning, implementing, and maintaining the software and security solutions its clients need to stay safe.

Read More »
03/16/2023
Return to RESOURCES
Products
Solutions
Customers
Marketplace
Partners
Resources
Company
Trust Portal
Security Ratings
Login
Blog
Contact
Careers

SecurityScorecard
Tower 49
12 E 49th St
Suite 15-100
New York, NY 10017

[email protected]

United States: (800) 682-1701
International: +1(646) 809-2166
Social-linkedin Social-facebook Twitter Instagram Youtube
  • Terms of Use
  • Privacy Policy
  • Patents
  • Cookies
© 2022 SecurityScorecard