Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Silent Push Traffic Origin Data Combined with Residential Proxy Data Uncovers Suspicious Chinese VPN

0
Medium
Published: Tue Feb 10 2026 (02/10/2026, 09:09:44 UTC)
Source: AlienVault OTX General

Description

An investigation using Silent Push's Traffic Origin and residential proxy data revealed a suspicious Chinese VPN provider. The analysis focused on IP address 205.198.91.155, which showed unusual traffic from Russia, China, Myanmar, Iran, and Venezuela. This IP was linked to the domain lvcha.in, hosting a Chinese-language VPN. Further investigation uncovered nearly 50 related domains promoting the same VPN, suggesting attempts to bypass country-level firewalls. The VPN's infrastructure was found to use residential proxies and had connections to various high-risk countries. This case study demonstrates the importance of verifying physical and technical behaviors of connections to protect against fraud and state-sponsored actors using stolen identities and spoofed locations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 18:45:11 UTC

Technical Analysis

This threat involves a suspicious Chinese VPN provider identified through a combined analysis of Silent Push Traffic Origin data and residential proxy intelligence. The investigation centered on IP address 205.198.91.155, linked to the domain lvcha.in, which hosts a Chinese-language VPN service. Nearly 50 additional domains promoting the same VPN were discovered, suggesting a coordinated effort to circumvent country-level firewalls and censorship. The VPN infrastructure leverages residential proxies, which are IP addresses assigned to ordinary consumer devices, to mask its true origin and evade detection. Traffic analysis revealed unusual patterns originating from high-risk countries such as Russia, China, Myanmar, Iran, and Venezuela, indicating potential use by state-sponsored threat actors or fraudsters employing geolocation spoofing and stolen identities. The campaign aligns with tactics including T1090 (proxy), T1133 (external remote services), T1584 (compromise infrastructure), and T1608 (state-sponsored). Although no direct exploits or malware have been observed, the use of residential proxies and multiple domains complicates attribution and detection. This case underscores the necessity for organizations to verify both physical and technical connection attributes to defend against sophisticated evasion techniques and fraud. The threat does not target specific software versions and lacks known exploits in the wild, but its infrastructure could facilitate future malicious activities.

Potential Impact

The primary impact of this threat lies in its potential to undermine geolocation-based security controls and network filtering mechanisms. Organizations relying on IP-based geofencing or country-level firewall rules may be deceived by the VPN's use of residential proxies and spoofed traffic origins, allowing threat actors to bypass restrictions and gain unauthorized access. This can facilitate fraud, data exfiltration, or reconnaissance by state-sponsored groups or cybercriminals. Additionally, the presence of multiple domains and proxy infrastructure increases the complexity of detection and mitigation efforts, potentially leading to prolonged exposure. While no direct malware or exploits are currently linked to this VPN, its infrastructure could be leveraged for future attacks, including command and control communication or lateral movement within networks. The threat also poses reputational risks for organizations if their networks are used as proxies or if they inadvertently allow malicious traffic. Overall, the impact is moderate but significant for entities with strict geolocation policies or those targeted by nation-state adversaries.

Mitigation Recommendations

To mitigate this threat, organizations should implement advanced network traffic analysis capable of detecting anomalies associated with residential proxy usage and geolocation spoofing. This includes correlating IP reputation data with behavioral indicators and employing threat intelligence feeds that identify suspicious VPN domains and IPs. Network segmentation and strict access controls can limit exposure if unauthorized VPN traffic is detected. Deploying multi-factor authentication and continuous user behavior analytics helps reduce risks from compromised credentials or spoofed identities. Organizations should also regularly update firewall and proxy configurations to block known malicious IP ranges and domains linked to this VPN infrastructure. Collaboration with threat intelligence providers to receive timely updates on emerging proxy networks and suspicious VPN services is essential. Finally, educating security teams on the tactics used by state-sponsored actors to evade detection will improve incident response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.silentpush.com/blog/traffic-origin-chinese-vpn"]
Adversary
null
Pulse Id
698af5d8f28d08f2e63399dd
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash994dfe8573747f2b90e4d32b5ae07fc6

Ip

ValueDescriptionCopy
ip194.147.16.244
ip205.198.91.136
ip205.198.91.155

Domain

ValueDescriptionCopy
domaincatixs.com
domainlcabc.icu
domainlcapi.shop
domainlcapp.bar
domainlcapp.bond
domainlcapp.cfd
domainlcapp.cyou
domainlcapp.icu
domainlcapp.my
domainlcapp.qpon
domainlcapp.sbs
domainlcapp.shop
domainlcapp.xyz
domainlcpro.bar
domainlcpro.bond
domainlcpro.cc
domainlcpro.cfd
domainlcpro.cyou
domainlcpro.icu
domainlcpro.qpon
domainlcpro.sbs
domainlcpro.shop
domainlcpro.top
domainlcpro.vip
domainlcvpn.bond
domainlcvpn.cc
domainlcvpn.cfd
domainlcvpn.cyou
domainlcvpn.qpon
domainlcvpn.sbs
domainlcvpn.shop
domainlcvpn.top
domainlcvpn.xyz
domainloopvpn.org
domainlvcha.in
domainlvcha.org
domainlvcha.qpon
domainlvcha.sbs
domainlvchaapp.bond
domainlvchaapp.cc
domainlvchaapp.cyou
domainlvchaapp.icu
domainlvchaapp.pw
domainlvchaapp.site
domainlvchaapp.store
domainlvchaapp.vip
domainlvchavpn.bond
domainlvchavpn.cfd
domainlvchavpn.one

Threat ID: 698b053e4b57a58fa1fad57f

Added to database: 2/10/2026, 10:15:26 AM

Last enriched: 3/12/2026, 6:45:11 PM

Last updated: 3/29/2026, 4:23:10 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses