Check an IP Address, Domain Name, Subnet, or ASN
103.132.100.251 has a very high threat confidence level of 87%, originating from Mumbai, India, on the Juweriyah Networks Private Limited network (138296). It has been observed across 28 sessions targeting SMB, MSSQL, with detected attack patterns including remcom remote execution, smb remote service stager via mshta, First observed on February 24, 2026, most recently active March 10, 2026.
Sequential SMB session opening IPC$, accessing the svcctl pipe, issuing an RPC call, then opening the RemCom_communicaton pipe. Indicates remote service-based command execution.
Composite behavior indicating remote lateral movement over SMB followed by service-based execution of a staged payload delivered through mshta invoking msiexec from remote infrastructure. The sequence combines IPC$ share access, SAMR and SVCCTL RPC binding, service control pipe interaction, and remote command execution consistent with administrative service creation or modification to execute a downloaded installer. This pattern is strongly associated with hands-on-keyboard intrusion activity and automated lateral propagation frameworks leveraging Windows service execution for payload deployment.