z3tssu
  • README
  • Cybersecurity Certifications & Notes
    • Cybersecurity Knowledge Base
      • IPPSEC's Video Search for Hacking Methods
      • Finding Someone's Location with Seeker
      • Nishang Project
      • Hacktricks
    • 📜Certifications & Courses
      • 🟢Hackthebox - CPTS
        • Getting Started
          • General
          • Tmux
          • Vim
          • Service Scanning
        • Penetration Testing Process
        • Network Enumeration with Nmap
          • Host Discovery
          • Host and Port Scanning
          • Saving the Nmap Scanning Results
          • Service Enumeration
          • Nmap Scripting Engine
            • Update the Scripting Engine
            • Nmap Script Locations
          • Performance Tags
          • Firewall and IDS/IPS Evasion
        • 👣Footprinting
          • 🔎Host-Based Service Enumeration
            • FTP [21]
              • Basics
                • vsFTPd Detailed Output
                • Hiding IDs - YES
              • Footprinting FTP
                • Nmap FTP Script Scanning
                • Service Interaction
              • FTP Commands
            • SMB [139/445]
              • Basics
                • Default Configuration
                • Create and Manage Samba Share
                • smbstatus
              • Footprinting SMB
                • SMB Nmap Scan
                • Smbclient
                • RPCclient
                  • Useful Commands
                  • Basic Enumeration
                  • Enumerate Users
                  • Group Information
                  • Bruteforcing User RIDs
                • smbmap
                • CrackMapExec
                • Enum4Linux-ng
            • NFS [111,2049]
              • Basics
                • Default Configuration of NFS
                • Creating an NFS Entry
                • Dangerous Settings
              • Footprinting NFS
                • nmap
                  • Basic Scan
                  • NFS Script Scan
                • Mount an NFS Share
                • Unmount NFS
            • DNS [53]
              • Basics
                • DNS Records
                • Default Configuration
                • Dangerous Settings
              • Footprinting DNS
                • DIG - NS QUERY
                • DIG - Version Query
                • DIG - Any Query
                • DIG - AXFR Zone Transfer
                • DIG - AXFR Zone Transfer - Internal
                • Subdomain Bruteforcing (For Loop with Seclists)
                • Subdomain Bruteforce (DNSenum)
            • SMTP (25,587)
              • Telnet SMTP
                • Telnet - HELO/EHLO
                • Telnet - VRFY
                • Telnet - Send an Email
              • Nmap Telnet
              • FTP User Enumeration
            • IMAP/POP3 [110,995,143,993]
              • Default Configuration
            • SNMP[161]
            • MySQL [3306]
            • MSSQL [1433]
            • Oracle TNS [1521]
            • IPMI [623]
            • SSH [22]
            • Rsync [873]
            • R-Services [512, 513, 514]
            • RDP [3389]
            • WinRM [5985, 5986]
            • WMI [135]
          • Introduction
            • Enumeration Principles
            • Enumeration Methodology
          • Infrastructure Enumeration
            • Domain Information
            • Cloud Resource
            • Staff
        • 🕸️Web Information Gathering
          • 🤷‍♂️WHOIS
          • 🧬DNS
            • 🧬DIG
          • 📚Subdomain Enumeration
            • DNS Zone Transfer
            • Sub Domain Bruteforcing
            • Virtual Hosts
              • Gobuster vhosts brutefoce
              • Add Vhosts to /etc/hosts
            • Certificate Transparency Logs
          • 🖐️Fingerprinting
            • Banner Grabbing
            • Web Application Firewall (Wafw00f)
            • Nikto
          • Crawling
            • robots.txt
            • .Well-Known URIs
            • Popular Web-Crawlers
              • Scrapy (ReconSpider)
              • Apache Nutch (Scalable Crawler)
              • Burp Suite Spider
              • OWASP ZAP (ZED Attack Proxy)
          • 🔥Automating Recon
            • FinalRecon
          • 🔍Search Engine Discovery
            • 🔍Google Dorking
            • 🔍Search Operators
          • Web Archives
          • Questions
            • Question 4
            • Question 5
        • Vulnerability Assessment
          • Vulnerability Scanning Tools
            • Nessus
              • Installing and Starting Nessus
              • Nessus Scan Types
              • Nessus Polices
                • Creating a Nessus Policy
              • Nessus Plugins
                • Creating a Plugin Rule
              • Credentialed Scanning
                • HTB Credentials for Nessus
              • Exporting Nessus Scans
              • Scanning Issues
            • OpenVAS
              • Installing OpenVAS
              • OpenVAS Scan
              • Exporting Scans
            • Nexpose
            • Qualys
          • Security Assessments
          • Vulnerability Assessment
          • Assessment Standards
          • Common Vulnerability Scoring System (CVSS)
          • Common Vulnerabilities and Exposures (CVE)
            • Open Vulnerability Assessment Language (OVAL)
          • Reporting
        • 📂File Transfers
          • File Transfer Methods
            • Windows File Transfer Methods
              • ⬇️Download Operations
                • 🪟 PowerShell Base64 Encode & Decode
                • 🌐 PowerShell Web Downloads -
                • 📦 SMB Downloads
                • 🌐 FTP Downloads
              • ↗️Upload Operations
                • 🔐 Encode File Using PowerShell
                • 🌐 PowerShell Web Uploads
                • 🧬 PowerShell Base64 Web Upload
                • 🌐 SMB Uploads with WebDAV Twist
                • 📡 FTP Uploads
            • Linux File Transfer Methods
              • Download Operations
                • 📦 Base64 Encoding / Decoding for File Transfers
                • 🌐 Web Downloads with Wget and cURL
                • 💣 Fileless Attacks in Linux – Execute Directly
                • 🐚 Download with Bash using /dev/tcp
                • 🔐 SSH Downloads with scp
                  • More Usage on SCP
              • Upload Operations
                • 🌐 Web Upload with HTTPS 🚀
                • 🛠️ Quick Web File Transfer Method
                • 🔄 SCP Upload
            • Transferring Files with Code
              • Downloading Files
              • Uploading Files
            • Transfer Files with Netcat, Ncat, RDP
            • Powershell Session File Transfer
            • RDP File Transfer
            • Protected File Transfers
            • Sending Files over HTTP/S
            • Upload and Download with Built in OS Tools
          • Detect or Be Detected
            • Detection
            • Evade Detection
        • 🐚Shells & Payloads
          • The Shell Basics
            • Bind Shell
            • Reverse Shell
          • Creating Payloads
            • Introduction to Payloads
            • Metasploit Payloads
            • Crafting Payloads with MSFvenom
          • Infiltrating Windows
            • 🛠️ MS17-010 EternalBlue
          • Infiltrating Unix/Linux
            • 🐍 Spawning a TTY Shell with Python
            • Spawing Interactive Shells
          • Web Shells
            • 🧪 Laudanum – "One Web Shell to Rule Them All"
            • 🧠 Antak Webshell + ASPX Concepts
            • 🐘 PHP Web Shells
            • Shells & Payloads - The Live Engagement
          • Detection and Prevention
        • 👾Metasploit
          • Introduction
            • 🧰 Introduction to Metasploit Framework (MSF)
            • MSF Engagement Structure
          • MSF Components
            • 🧰 Modules
            • 🎯 Targets
            • 🧠 Payloads
            • 🔧 Encoders?
            • 🗄️ Database
            • 🔌 Plugins
          • MSF Sessions
            • 🔁 Sessions
            • 🛠️ Meterpreter
          • Additional Features
            • 🛠️ Installing & Importing Custom Metasploit Modules
            • 🧠 Porting Scripts into Metasploit Modules
            • 💥 Introduction to MSFVenom
            • 🛡️ Firewall and IDS/IPS Evasion
        • ⚔️Password Attacks
          • Where Credentials are Stored?
          • John The Ripper
          • Remote Password Attacks
            • 🖥️ Network Services
              • WinRM [5985, 5986]
              • SSH [22]
              • RDP [3389]
              • SMB [139,445]
              • Questions
            • 🔐 Password Mutations & Wordlist Generation
            • 🔐 Password Reuse & Default Passwords
          • Windows Local Password Attacks
            • Attacking SAM (Security Account Manager)
            • Attacking LSASS
      • TCM Security - PNPT
      • Cisco Ethical Hacker
      • Introduction to Hacking Methodology
    • Pentesting Services
    • Pentesting Web
      • CBBH
      • TCM Security - Practical Web Hacking
    • Pentesting Wi-Fi
      • OSWP
      • Wireless Penetration Test (WPA2)
    • Pentesting Cloud
    • Network Defense
      • Blue Team Level 1
    • 🐍Scripting with Python
    • ☢️Active Directory Penetration Testing
      • Initial Attack Vectors
      • Post Compromise Enumeration
    • Cybersecurity Job Skills
      • Information Security Officer Guide
    • 🔍IP Address Investigation
      • WHOIS
      • Reverse DNS
      • Geolocation of the IP
      • Check If IP is Active and has Services Running
      • Check the IP Reputation
      • Check Passive DNS History
      • Confirm the Actual Server Location
    • Cybersecurity Projects
      • Wireless Penetration Test (WPA2)
      • AWS Honeypot
      • SOC Analyst Home Lab
      • Threat Management with Wazuh SIEM
    • Cybersecurity Books
    • 🔄SOC
  • IT Certifications & Notes
    • Certifications
      • MS-900 Microsoft 365 Fundamentals
        • Describe Microsoft security and compliance capabilities
          • Describe the functions and identity types of Microsoft Entra ID
          • Describe access management capabilities of Microsoft Entra
            • Introduction
            • Describe Conditional Access
            • Describe Global Secure Access in Microsoft Entra
            • Describe Microsoft Entra roles and role-based access control (RBAC)
      • CISSP
      • ITIL
        • ITIL 4 Foundations
      • CCNA
        • David Bombal - Udemy
        • CCNA Training - Jeremy's IT Lab
          • Resources
          • Cisco Packet Tracer Labs
            • Cisco Packet Tracer Overview
            • Packet Tracer Lab 1
      • MCSE Certification Options
      • AZ-900
    • IT Projects & Training
      • Windows Server 2016 - Active Directory Lab Build
      • Windows Server 2022 Fundamentals
        • Introduction to Server Manager
          • Installing and Configuring Server Manager
          • Creating a VM on Microsoft Azure for Server 2022
        • Introduction to Active Directory
          • Active Directory and Setting up
          • Active Directory Overview
          • Delegation Rights for Active Directory
          • Active Directory Administrative Center
          • Common cmd commands for IT Support
        • Group Policy Management
          • How to apply basic GPO
        • Introduction to Share Folders
          • Creating Share Folders on Server Manager
          • Share Folder Permissions for Users
          • Map a Network Drive (locally)
          • Map a Network Drive through Active Directory
        • Understanding Windows/Common AD Issues
          • Installing RSAT Tools
          • Joining a PC to the Domain
        • Real Life IT Support Issues
          • When a User Gets locked out their accounts
          • Change Password of a User
      • Office 365 For IT Support
        • Office 365 Overview
      • Microsoft Azure Training
        • Getting Started in the Azure Portal
        • Introduction to Microsoft Azure Services
        • Basic Usage of Azure Services
        • Azure Deploy Sql Database Overview
        • Azure AD Connect Overview
        • Azure Microsoft File Share/Map Drives
        • Deploy Windows 11 to Azure
        • Microsoft Azure Basic Fundamentals (Azure Active Directory)
        • Introduction to Vnet (Overview)
        • Microsoft Azure Network/Security
        • Microsoft Azure Tagging (Final Course)
      • Networking Projects with Cisco Packet Tracer
        • Build a Basic Network
        • Webserver Project
      • Setup and Router and Switch
    • IT Knowledge Base
  • CTF/Box WRITEUPS
    • Tryhackme
    • HTB
      • Footprinting Lab - Easy
      • Footprinting Lab - Medium
      • Footprinting Lab - Hard
      • Nessus Skills Assessment
      • OpenVAS Skills Assessment
      • Tier 0
      • Tier 1
  • Cryptocurrency/Blockchain
    • Cryptocurrency Investigation
    • Certifications
      • Certified Blockchain Security Professional
Powered by GitBook
On this page
  1. Cybersecurity Certifications & Notes

IP Address Investigation

PreviousInformation Security Officer GuideNextWHOIS

Last updated 2 months ago

Investigation Steps/Breakdown

1. What is an IP Address?

An IP address (like 141.98.9.152) is a unique identifier for a device or server on the internet. It tells us who owns it, where it’s hosted, and what it’s used for.

Think of it like a house address:

  • The house number = IP Address (141.98.9.152)

  • The neighborhood = Network (141.98.9.0/24)

  • The city/government managing it = Autonomous System (AS209588)


2. What’s the Role of an Autonomous System (AS)?

An Autonomous System (AS) is a large group of IP addresses managed by an internet service provider (ISP) or cloud hosting company.

For 141.98.9.152:

  • It belongs to AS209588 (FLYSERVERS-ASN).

  • FLYSERVERS-ASN is the company that controls this block of IPs.

  • The entire 141.98.9.0/24 network is part of this system.

💡 Think of AS as a postal service (like DHL or FedEx):

  • It routes internet traffic between different networks.

  • Multiple IPs are grouped under one AS to keep things organized.


3. WHOIS & Ownership: Who Controls This IP?

WHOIS records store ownership information about IP addresses.

For 141.98.9.152, the owner is:

  • Alviva Holding Limited

  • Located in Victoria, Mahé, Seychelles

  • Network Name: DIGICLOUD-NET

  • Service Type: VDS & Cloud Services

💡 Think of this like a business registry:

  • DIGICLOUD-NET is the brand offering virtual cloud servers.

  • Alviva Holding Ltd is the company managing the business.

🚩 Why is this important?

  • If the IP is doing something suspicious, this tells who to contact.

  • Some companies register in offshore locations (like Seychelles) for privacy reasons.


4. Reverse DNS & Forward DNS (How We Link IPs to Websites)

Every website or server can have a name (domain) linked to an IP.

Reverse DNS (PTR Record)

  • Converts an IP → Hostname (e.g., 141.98.9.152 → example.com)

  • No Data means there is no known hostname for this IP.

Forward DNS (A Record)

  • Converts a Hostname → IP (e.g., example.com → 141.98.9.152)

  • No Data means no domain is directly linked to this IP.

💡 Think of DNS as a phonebook:

  • Reverse DNS = Finding the name of the caller from their number.

  • Forward DNS = Finding the number of a person by their name.

🚩 Why is this important?

  • If an IP has a Reverse DNS name, we know what service it’s hosting.

  • If it has no Reverse DNS, it’s likely a generic cloud server or a hidden service.


5. Why Does This Matter for Security & Investigations?

  1. If an IP is involved in cybercrime, checking WHOIS and ASN helps track who owns it.

  2. If an IP is sending spam, checking Reverse DNS and network info helps block it.

  3. If an IP is hosting a website, checking DNS records helps link it to a domain.

  4. If an IP is part of a cloud provider, it might be used for VPNs, proxies, or malicious bots.

💡 Example Use Cases:

  • Investigating Phishing Websites: Check if an IP is linked to scam domains.

  • Blocking Malicious IPs: If an IP has a bad reputation (spamming, hacking), you can block it.

  • Tracking Hackers: Knowing an IP’s hosting provider helps in legal investigations.


Final Breakdown

Concept

What It Means

IP Address

A unique identifier for a device on the internet (e.g., 141.98.9.152).

AS (Autonomous System)

A big network of IPs controlled by one company (e.g., AS209588 = Flyservers).

WHOIS

A registry showing who owns the IP (e.g., Alviva Holding Ltd, Seychelles).

Reverse DNS

Converts IP → Domain (e.g., 141.98.9.152 → No Data = No hostname).

Forward DNS

Converts Domain → IP (e.g., example.com → 141.98.9.152).

Services & OS

Shows active services (e.g., web servers, email) – but here it shows 0 detected services.

Geolocation

IPs are registered in Seychelles, but might be physically hosted elsewhere (e.g., Netherlands).


IP Address Investigation 1

Step-by-Step Guide to Investigating an IP Address (141.98.9.152)

Below is a structured step-by-step approach to investigating an IP address, the tools to use, and how to interpret the output.


Step 1: Perform a WHOIS Lookup

📌 Purpose: Find out who owns the IP address and which organization manages it.

Tools to Use:

  • Online WHOIS Lookup:

  • Command-Line (Linux/macOS/Windows PowerShell):

    whois 141.98.9.152

Output Breakdown:

Field

Explanation

Netname

The name of the IP range (e.g., DIGICLOUD-NET).

Organization

The company that owns the IP (e.g., Alviva Holding Limited, Seychelles).

ASN (Autonomous System Number)

Identifies the network operator (e.g., AS209588, Flyservers S.A.).

Abuse Contact

Email for reporting abuse if the IP is malicious.


Step 2: Check the Reverse and Forward DNS Records

📌 Purpose: Find out if the IP is linked to a hostname (e.g., a website or server).

Tools to Use:

  • Online Reverse Lookup:

  • Command-Line:

    nslookup 141.98.9.152

    or

    dig -x 141.98.9.152

Output Breakdown:

Field

Explanation

Reverse DNS (PTR Record)

If available, it tells what hostname this IP resolves to.

Forward DNS (A Record)

If the IP has a linked domain, it will be shown here.

No Data

Means the IP is likely used for anonymous or cloud-based activities.


Step 3: Check Geolocation of the IP

📌 Purpose: Find the physical location of the IP (though it may not be accurate).

Tools to Use:

  • Online Geolocation Tools:

  • Command-Line:

    curl https://ipinfo.io/141.98.9.152/json

Output Breakdown:

Field

Explanation

Country

The country the IP is registered to (e.g., Seychelles).

City/Region

More specific location data (e.g., Schiphol-Rijk, Netherlands).

ISP

The Internet Service Provider (e.g., Flyservers S.A.).

🚨 Warning:

  • Many cloud providers register IPs in one country (Seychelles) but host services in another (Netherlands, USA, etc.).

  • If the IP is linked to a VPN or proxy service, it may show an incorrect location.


Step 4: Check if the IP is Active and Running Services

📌 Purpose: Find out if the IP has open ports (web servers, email, remote access).

Tools to Use:

  • Shodan (IP Intelligence & Port Scanner):

    • Run a scan:

      shodan host 141.98.9.152
  • Nmap (Advanced Network Scanner):

    nmap -Pn 141.98.9.152

    or to check specific ports:

    nmap -p 22,80,443 141.98.9.152

Output Breakdown:

Field

Explanation

Open Ports

Shows if the IP is running services like a web server (80/443) or SSH (22).

No Open Ports

Means the server is either inactive or blocking scans.


Step 5: Check if the IP Has a Bad Reputation

📌 Purpose: Find out if the IP has been reported for malicious activity (hacking, spam, fraud, botnets, etc.).

Tools to Use:

  • AbuseIPDB (Reports of malicious activity):

  • VirusTotal (Check if the IP is linked to malware/phishing):

Output Breakdown:

Field

Explanation

Number of Reports

How many times users have flagged this IP.

Reason for Reports

Spam, phishing, hacking attempts, etc.

Last Reported Date

If it was reported recently, it might still be active in attacks.


Step 6: Check Passive DNS History

📌 Purpose: Find if the IP has ever hosted domains in the past.

Tools to Use:

  • SecurityTrails (Passive DNS Lookups):

  • ViewDNS.info (Historical IP records):

Output Breakdown:

Can also refer Web Information Gathering

🔍
WHOIS Lookup (ARIN)
RIPE Database
IPinfo.io
MXToolbox Reverse Lookup
DNSstuff
IPinfo.io
ip-api.com
MaxMind GeoIP
Shodan.io
AbuseIPDB
VirusTotal
SecurityTrails
ViewDNS.info