Check an IP Address, Domain Name, Subnet, or ASN
152.32.139.9 has a threat confidence score of 93%. This IP address from South Korea (AS135377, UCLOUD INFORMATION TECHNOLOGY HK LIMITED) has been observed in 220 honeypot sessions and reported 1 times targeting IMAP, SMTP, HTTPS, HTTP, TELNET and 8 other protocols. First observed on February 3, 2026, most recently active April 2, 2026.
FTP session where a client probes for valid usernames, attempts authentication, switches to ASCII mode, and enters passive mode without performing explicit file listing or transfer operations. This reflects a completed login and session setup sequence, often observed during credential validation or preparatory access prior to further activity.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
Identifies HTTP GET requests directly targeting the /bad-request path, indicating automated or manual probing of application error-handling routes rather than legitimate navigation flow.
FTP session where the client issues AUTH TLS to upgrade the connection to Transport Layer Security. This reflects protocol-level encryption negotiation prior to further interaction.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 13, 2026, 09:05 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |