Check an IP Address, Domain Name, Subnet, or ASN
134.199.198.128 has a threat confidence score of 100%. This IP address from United States (AS14061, DigitalOcean, LLC) has been observed in 208 honeypot sessions targeting SSH protocols. Detected attack patterns include ssh host fingerprint and shell rc immutable removal. First observed on January 31, 2026, most recently active February 21, 2026.
Execution of a multi-command host fingerprinting script that collects kernel details, architecture, uptime, CPU count and model, GPU information, login history, and binary help characteristics, combined with chattr -i $HOME/.bashrc $HOME/.zshrc 2>/dev/null || true to remove the immutable attribute from user shell initialization files in the current user’s home directory.
Identifies the use of SCP in quiet mode (-q) with “to” mode (-t), indicating the remote system is receiving a file. This pattern is commonly associated with post-authentication payload delivery, lateral movement staging, or tool transfer to a compromised host.