Check an IP Address, Domain Name, Subnet, or ASN
134.199.207.132 has a threat confidence score of 100%. This IP address from United States (AS14061, DigitalOcean, LLC) has been observed in 157 honeypot sessions targeting SSH protocols. Detected attack patterns include ssh hardened host profiling and shell rc immutability bypass. First observed on January 24, 2026, most recently active March 3, 2026.
Identifies SSH post-auth activity combining resilient multi-source CPU enumeration (explicit /usr/bin/nproc fallback) with removal of the immutable flag from ~/.shellrc via chattr, indicating host profiling followed by shell configuration tampering for persistence preparation.
Identifies the use of SCP in quiet mode (-q) with “to” mode (-t), indicating the remote system is receiving a file. This pattern is commonly associated with post-authentication payload delivery, lateral movement staging, or tool transfer to a compromised host.