Check an IP Address, Domain Name, Subnet, or ASN
130.162.132.75 has a threat confidence score of 100%. This IP address from South Korea (AS31898, Oracle Corporation) has been observed in 230 honeypot sessions and reported 1 times targeting SSH protocols. Detected attack patterns include ssh authorized keys persistence established, ssh automated post compromise recon and persistence chain. First observed on February 20, 2026, most recently active March 21, 2026.
Removal of filesystem attribute protections from the user’s .ssh directory followed by deletion and recreation of the directory and insertion of a new public key into authorized_keys. This pattern reflects deliberate modification of SSH trust configuration to establish persistent key-based access.
Identifies an SSH session performing comprehensive automated host reconnaissance (CPU, memory, disk, processes, users), followed by credential modification and SSH key manipulation consistent with scripted post-compromise takeover and persistence establishment.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| Anonymous | Mar 19, 2026, 01:59 | Brute Force | SSH | SikkerGuard: 14 blocked packets |