Check an IP Address, Domain Name, Subnet, or ASN
139.59.0.38 has a threat confidence score of 100%. This IP address from India (AS14061, DigitalOcean, LLC) has been observed in 453 honeypot sessions targeting SSH, TELNET, HTTP, HTTPS protocols. Detected attack patterns include ssh hardened host profiling and shell rc immutability bypass, telnet busybox shell activation with capability check. First observed on March 2, 2026, most recently active March 26, 2026.
Identifies SSH post-auth activity combining resilient multi-source CPU enumeration (explicit /usr/bin/nproc fallback) with removal of the immutable flag from ~/.shellrc via chattr, indicating host profiling followed by shell configuration tampering for persistence preparation.
Identifies a Telnet session where BusyBox is leveraged to activate or access a shell environment (sh, shell, system, linuxshell, enable) followed by command capability validation (ping). This pattern reflects deliberate shell breakout and execution-context validation commonly observed in IoT botnets and embedded Linux compromise workflows. The presence of multiple shell invocation variants combined with BusyBox applet usage indicates adaptive execution logic rather than incidental command usage.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration