I have started to get daily entries like this in my router's log relating to my Cisco SP122 ATA:
[LAN access from remote] from 51.75.147.31:5168 to 192.168.0.222:5061 Sunday, Dec 13,2020 00:53:14
[LAN access from remote] from 103.145.13.18:5311 to 192.168.0.222:5061 Saturday, Dec 12,2020 17:53:36
[LAN access from remote] from 103.145.13.63:5236 to 192.168.0.221:5061 Thursday, Dec 10,2020 23:34:04
The first thing you should check is that the router doesn't have UPnP enabled. If it does, disable it. Do you have any port forwarding or any other kind of remote access enabled on your router?
I see frequent scan attempts from the 103.145.13.x IP range, mostly VoIP related; TCP 5038 (
Asterisk Manager Interface), TCP 50802 (
Avaya System discovery from Manager), TCP 5060 (SIP), TCP 81 (common HTTP alternative), TCP 443 (HTTPS), TCP 8089 (TR-069) and TCP 8443 (common HTTPS alternative).
I see no other ports scanned from that address range which leads me to suspect that the servers at those addresses are specifically looking for unprotected VoIP systems.
That raises the question; who do they belong to?
Bear with me on this.
A cursory glance shows;
inetnum: 103.145.13.0 - 103.145.13.255
netname: CINTY-NL-02
descr: CINTY EU WEB SOLUTIONS
country: NL
admin-c: CEWS1-AP
tech-c: CEWS1-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-CINTY
mnt-irt: IRT-CINTY
last-modified: 2020-03-10T07:13:13Z
geoloc: 52.6921234 6.1937187
source: APNIC
role: CINTY EU WEB SOLUTIONS
address: Nieuwkerksedijk 10, Goirle
country: NL
phone: +31668630452
e-mail: [email protected]
admin-c: JG1401-AP
tech-c: JG1401-AP
nic-hdl: CEWS1-AP
mnt-by: MAINT-CINTY
abuse-mailbox: [email protected]
remarks: all abuse complaints must be sent to [email protected]
last-modified: 2020-03-10T07:05:00Z
source: APNIC
% Information related to '103.145.13.0/24AS213371'
route: 103.145.13.0/24
descr: CINTY EU WEB SOLUTIONS
origin: AS213371
mnt-by: MAINT-CINTY
last-modified: 2020-05-14T11:45:53Z
source: APNIC
A cursory glance is precisely what the operators of that IP address range want you to do, and nothing else. A search for "Cinty EU web solutions" reveals no trading information and the website doesn't help either.
Geolocation information puts the admin contact very precisely in a residential street in
Meppel, Netherlands but that doesn't match the given address of Nieuwkerksedijk 10, Goirle, Netherlands - 180km away. That physical address is for
Daub Bakery Machinery and nothing to do with an internet provider so summat's amiss.
The address and geolocation data along with the name "Cinty EU" and the domain name cinty.eu are designed to make you think it's a European company and therefore safe. It's not.
Someone is trying
very hard to hide whoever is behind these IP addresses so some deeper digging is required. The next thing we can look at is how traffic for these IP addresses is routed so we do a whois lookup of the AS number (AS213371);
organisation: ORG-SQTR1-RIPE
org-name: ABC Consultancy
org-type: OTHER
address: Netherlands
geoloc: 52.3702 4.8952
abuse-c: SN8949-RIPE
mnt-ref: SQUITTER-MNT
mnt-by: SQUITTER-MNT
created: 2020-04-13T10:54:36Z
last-modified: 2020-12-09T11:34:20Z
source: RIPE # Filtered
role: ABC Consultancy
address: Netherlands
abuse-mailbox: [email protected]
nic-hdl: SN8949-RIPE
mnt-by: SQUITTER-MNT
created: 2020-04-13T10:51:05Z
last-modified: 2020-12-09T11:35:47Z
source: RIPE # Filtered
Again we get some nice geolocation information putting this company 100m from one of my clients in the heart of Amsterdam. What can we find out about ABC Consultancy? Not very much because it's a bogus name. We have a little more luck with squitter.eu though as I previously reported the bogus Voniq.eu IP registration related to squitter.eu
here.
So, those IP addresses are the responsibility of a Russian operation based in St. Petersburg - again probably a bogus physical address. The Russian details which were previously showing for squitter.eu (nothing EU about it) were updated a week ago so now show ABC Consultancy in the Netherlands.