Check an IP Address, Domain Name, Subnet, or ASN
1.174.53.138 has a threat confidence score of 89%. This IP address from Taiwan (AS3462, Data Communication Business Group) has been observed in 158 honeypot sessions targeting SMB, MSSQL protocols. Detected attack patterns include smb remote service stager via mshta. First observed on March 24, 2026, most recently active March 25, 2026.
Composite behavior indicating remote lateral movement over SMB followed by service-based execution of a staged payload delivered through mshta invoking msiexec from remote infrastructure. The sequence combines IPC$ share access, SAMR and SVCCTL RPC binding, service control pipe interaction, and remote command execution consistent with administrative service creation or modification to execute a downloaded installer. This pattern is strongly associated with hands-on-keyboard intrusion activity and automated lateral propagation frameworks leveraging Windows service execution for payload deployment.