Check an IP Address, Domain Name, Subnet, or ASN
157.0.0.10 has a threat confidence score of 99%. This IP address from China (AS4837, CHINA UNICOM China169 Backbone) has been observed in 143 honeypot sessions and reported 23 times targeting TELNET protocols. Detected attack patterns include telnet shell escalation with busybox execution attempt. First observed on January 21, 2026, most recently active March 24, 2026.
Telnet session exhibiting privilege escalation and shell breakout commands (enable, system, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The sequence indicates an attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. The presence of an unknown BusyBox applet strongly suggests automated bot deployment logic rather than legitimate administrative activity.
Post_auth reconnaissance behavior that probes for available shell interpreters and BusyBox functionality to determine execution pathways, tooling availability, and compatibility for follow-on scripted actions
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 22, 2026, 05:51 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |
| User | Mar 21, 2026, 10:04 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |
| User | Mar 18, 2026, 05:06 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |
| User | Mar 17, 2026, 12:56 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |
| User | Mar 14, 2026, 21:32 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |