Check an IP Address, Domain Name, Subnet, or ASN
151.95.40.145 has a very high threat confidence level of 99%, originating from Saccolongo, Italy, on the Wind Tre S.p.A. network (1267). It has been observed across 49 sessions targeting TELNET, with detected attack patterns including telnet busybox shell activation with capability check, telnet shell breakout with busybox payload execution, First observed on February 21, 2026, most recently active February 21, 2026.
Identifies a Telnet session where BusyBox is leveraged to activate or access a shell environment (sh, shell, system, linuxshell, enable) followed by command capability validation (ping). This pattern reflects deliberate shell breakout and execution-context validation commonly observed in IoT botnets and embedded Linux compromise workflows. The presence of multiple shell invocation variants combined with BusyBox applet usage indicates adaptive execution logic rather than incidental command usage.
Telnet session exhibiting privilege escalation and shell breakout attempts (enable, system, linuxshell, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The combination indicates an automated attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. This pattern is characteristic of IoT/Linux bot deployment frameworks leveraging BusyBox as a universal execution wrapper.