Check an IP Address, Domain Name, Subnet, or ASN
106.12.152.131 has a threat confidence score of 99%. This IP address from China (AS38365, Beijing Baidu Netcom Science and Technology Co., Ltd.) has been observed in 56 honeypot sessions targeting SSH, TELNET protocols. Detected attack patterns include ssh authorized keys persistence established, ssh interactive environment profiling with access consolidation. First observed on February 12, 2026, most recently active April 2, 2026.
Removal of filesystem attribute protections from the user’s .ssh directory followed by deletion and recreation of the directory and insertion of a new public key into authorized_keys. This pattern reflects deliberate modification of SSH trust configuration to establish persistent key-based access.
Identifies an SSH session performing multi-method system profiling (CPU model extraction, memory and disk inspection, active user/process monitoring), followed by SSH key replacement and password update indicative of interactive access validation and consolidation rather than single-shot automated takeover.
Attempts to remove filesystem attribute protections (e.g., immutable flags via chattr -i/-a) from the user’s ~/.ssh directory. This pattern indicates preparatory activity to modify SSH trust configuration, commonly preceding insertion or replacement of authorized_keys for persistence.
Identifies SSH session activity where the attacker executes uname -s -m to retrieve the operating system name and machine architecture for host fingerprinting and payload targeting.