173.194.43.12

lga15s34-in-f12.1e100.net

IP Address Information

The Internet Service Provider (ISP) that owns the network address of 173.194.43.12 is Google Inc. and located in California within the United States. The IP Address resolves to the DNS record of lga15s34-in-f12.1e100.net. Currently there are 54 domain names that utilize this address. The primary domain hosted by this IP is storage.googleapis.com along with 53 other domains which are known adware distribution web sites. This IP belongs to Google and resides on their public network "1e100.net is a Google-owned domain name used to identify the servers in our network. Most typical Internet users will never see 1e100.net, but we picked a Googley name for it just in case (1e100 is scientific notation for 1 googol)".
Scanner detections:
Detections  (74% detected)

Scan engine
Details
Detections

avast!
Win32:Malware-gen, Win32:Rootkit-gen [Rtk], MSIL:Downloader-NG [PUP], Win32:Adware-gen [Adw], Win32:GenMaliciousA-IBX [PUP], Win32:GenMaliciousA-ICO [PUP]
68.42%

G Data
Win32.Trojan.Agent.D3J0Z5, Rootkit.72610, Gen:Variant.Graftor.179625, MSIL.Adware.OfferInstaller, Win32.Trojan.Agent.LHSW8C
55.26%

IKARUS anti.virus
Trojan.ExtenBro, Trojan-Downloader.Agent, PUA.MSIL.Downloader, AdWare.MSIL.Imali, Trojan.Win32.ChePro, Trojan-Downloader.Win32.Banload
52.63%

Baidu Antivirus
Adware.MSIL.Imali, Trojan.Win32.Downloader, Trojan.Win32.Autoit, Trojan.Win32.Banload, Adware.Win32.InstallCore, Trojan.MSIL.Banload
52.63%

ESET NOD32
Win32/TrojanDownloader.VB.QML, MSIL/Adware.Imali (variant), Win32/Adware.Imali (variant), Win32/TrojanDownloader.Autoit.NXH, Win32/InstallCore.ACZ potentially unwanted (variant)
50.00%

Avira AntiVirus
TR/ExtenBro.Z, TR/Dldr.Agent.434064, TR/Dropper.MSIL.Gen, ADWARE/Adware.Gen7, TR/Downloader.A.11343, TR/Dldr.Delphi.Gen
50.00%

Emsisoft Anti-Malware
Trojan.Win32.Agent, Rootkit.72610, Gen:Variant.Graftor.179625, Trojan.GenericKD.2298748, Trojan.GenericKD.2475248, Trojan.GenericKD.2795735, Gen:Variant.Midie.2998
47.37%

Sophos
Troj/FkAdob-A, Offer Installer, PUA 'Offer Installer', Generic PUA KI, Mal/Generic-S, Troj/DwnLdr-MLW
44.74%

McAfee
Artemis!4EE67DA9B613, RDN/Downloader.a!vg, Artemis!8035B8EB53A6, Trojan.Artemis!7CD975972D19, Artemis!C07BDD913E4D, Artemis!493252F63F27
44.74%

Kaspersky
UDS:DangerousObject.Multi.Generic, not-a-virus:AdWare.MSIL.Agent, Trojan-Downloader.Win32.Genome, HEUR:Trojan-Downloader.Win32.Generic
44.74%

The following domains resolved to the IP address 173.194.43.12.

Latest 50 of 54 domains

File URLs download from 173.194.43.12.

14 / 68    (Malware)

9 / 68      (PUP)

8 / 68      (PUP)

8 / 68      (PUP)

0 / 68
https://storage.googleapis.com/.../Setup.exe  (a5dc06fcf02a8820d18cbd815788fd93)

20 / 68    (PUP)

13 / 68    (Malware)
http://storage.googleapis.com/.../Youtube_Watch_Video.exe  (493252f63f27bcace91e9b25a5125c19)

34 / 68    (Malware)
http://storage.googleapis.com/.../Adobe_Flash_Player_2015.exe  (e739db160c2d63e4f876f9bf141c00f2.exe)

16 / 68    (Malware)

3 / 68      (PUP)
https://storage.googleapis.com/.../installer.exe  (ac8815b66e24f20e82638ce2b9815081)

6 / 68      (PUP)

8 / 68      (PUP)

27 / 68    (Adware)

30 / 68    (PUP)

1 / 68      (Adware)

1 / 68      (PUP)
https://storage.googleapis.com/.../installer.exe  (e21926e43cc2c4f1dfe2246ee1826741)

0 / 68

1 / 68      (PUP)
https://storage.googleapis.com/.../installer.exe  (51e8c367923b20e4019c84890b0ae7f3)

1 / 68      (PUP)
https://storage.googleapis.com/.../installer.exe  (b5f9503ca91dc856c2cb9433881f2c92)

24 / 68    (Malware)
https://storage.googleapis.com/.../Avast_x64.exe  (08b145e3e05260bc537abd9a5d955ff0)

34 / 68    (Malware)
http://storage.googleapis.com/.../Update_Google.exe  (b025fc73d5eb47cdba531879ffeb0f8b)

33 / 68    (Malware)
http://storage.googleapis.com/.../Update_Google.exe  (afd6ecc504779c5cf7ed191f90874a3d)

4 / 68      (Malware)

0 / 68
https://storage.googleapis.com/.../Documento.exe  (4648966b0be17d81438f02b91ed7411f)

1 / 68      (PUP)
https://storage.googleapis.com/.../installer.exe  (5d2d34671ac34dcc226e875daa6fd8a6)

 
Latest 30 of 125,818 download URLs

The following file have been seen to comunicate with this IP address in live environments.

The geographical location of this IP address.

Country:
United States (US)

Region:
California

City:
Mountain View

Coordinates:
37.406, -122.079

The ARIN network assigned organization for IP address 173.194.43.12.

Org name:
Google Inc.

Org identifier:
GOGL

Org country:
United States (US)

Org region:
California

Org city:
Mountain View

Org address:
1600 Amphitheatre Parkway

ARIN WHOIS:
NetRange: 173.194.0.0 - 173.194.255.255
CIDR: 173.194.0.0/16
OriginAS: AS15169
NetName: GOOGLE
NetHandle: NET-173-194-0-0-1
Parent: NET-173-0-0-0-0
NetType: Direct Allocation
RegDate: 2009-08-17
Updated: 2012-02-24
Ref: http://whois.arin.net/rest/net/NET-173-194-0-0-1


OrgName: Google Inc.
OrgId: GOGL
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2000-03-30
Updated: 2013-08-07
Ref: http://whois.arin.net/rest/org/GOGL

OrgTechHandle: ZG39-ARIN
OrgTechName: Google Inc
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: http://whois.arin.net/rest/poc/ZG39-ARIN

OrgAbuseHandle: ZG39-ARIN
OrgAbuseName: Google Inc
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: arin-contact@google.com
OrgAbuseRef: http://whois.arin.net/rest/poc/ZG39-ARIN


Autonomous System Assignment
ASNumber:
15169

ASName:
GOOGLE - Google Inc.

ASHandle:
AS15169

Remove Malware from 173.194.43.12 - Powered by Reason Core Security