New! Augur Identifies 38K Malicious IPs

Threat Research Team

Augur Security identified  38,000 new malicious IPs this past September. These have since been confirmed by external intelligence. Augur consistently detects emerging threats long before traditional intelligence.

Here is a small sample of the types of threats Augur identifies and protects against:

Name Type IP Lead Time
Rhadamanthys Infostealer 202[.[71[.]14[.]181 63 days
Remcos Remote Access Tool 92[.[61[.]71[.]38 65 days
EyePyramid Spyware / RAT 144[.]124[.]234[.]178 41 days
SmokeLoader Loader 77[.]91[.]77[.]144 81 days
SecTopRAT Remote Access Tool 45[.]151[.]104[.]27 211 days

If you aren’t already blocking these IPs, we highly recommend you do so.

While some emerging vendors in Preemptive Cybersecurity are focused on catching simple domain spoofing, typosquatting and lower-impact activity, Augur consistently preempts sophisticated, high-impact attacks, the kind that drive major headline breaches. Augur identifies far more consequential layers of attacker infrastructure — C2 servers, staging environments for data exfiltration, and delivery infrastructure — the types of assets set up by state actors, ransomware gangs, and sophisticated criminal groups before an attack ever begins.

Malicious IPs Used in Headline Attacks

In the last few months, Augur has identified IPs and domains that were later used in major campaigns that hit the headlines. These include the recent Salesforce/Salesloft, Sharepoint, and Taiwanese Semiconductor attacks.

Attack Threat Group Lead Time Research
Salesforce/Salesloft UNC6040
UNC6395
212 days Click Here
SharePoint Exploit Storm‑2603
Violet Typhoon (AKA APT31)
Linen Typhoon (AKA APT27)
360+ days Click Here
Taiwan Semiconductor Sector UNK_FistBump UNK_DropPitch 360+ days Click Here

Not all the IPs we identify hit the headlines, but the vast majority of the IPs and domains we identify are eventually used by threat actors to deploy attacks.

How Does Augur Work?

Augur uses ML-powered behavioral modeling to detect the buildup of cybercriminal infrastructure online before attacks. We identify thousands of malicious IPs, IP ranges, and domains every month. Augur identifies threats on average 60 days before they’re first reported by traditional sources. Our predictions are highly accurate, with a near-zero false-positive rate (0.01%), providing organizations using Augur with preemptive protection against cyberattacks, zero-days, and novel threats.

The Augur Difference. Let Us Prove It To You.

Experience firsthand the benefits of preemptive cyber defense with a quick proof of value (POV). We can have you up and running in less than a day, and after 30 days, get an Augur report detailing:

  • Threats Augur identified
  • Advance warning timelines
  • Data-driven insight on alert reduction and improved SOC efficiency

Click here to talk to an Augur specialist now.