Check an IP Address, Domain Name, Subnet, or ASN
159.223.43.21 has a threat confidence score of 100%. This IP address from Singapore (AS14061, DigitalOcean, LLC) has been observed in 249 honeypot sessions and reported 3 times targeting HTTP, HTTPS, SSH, DOCKER, TELNET protocols. Detected attack patterns include docker remote exec via api, http mass web rce exploitation scanning. First observed on January 21, 2026, most recently active March 20, 2026.
Attacker interaction with an exposed Docker Engine API resulting in container enumeration followed by remote command execution inside running containers. The sequence of GET /containers/json and subsequent POST /containers/{id}/exec and /exec/{id}/start calls represents deliberate hands-on-keyboard activity where the adversary uses the Docker daemon as a control plane to execute commands, deploy payloads, or pivot further within the host environment. This behavior reflects active container abuse observed directly through high-interaction honeypot instrumentation.
Coordinated automated exploitation attempts targeting public-facing web services, including PHPUnit eval-stdin access, PHP-CGI argument injection, Docker API exposure, directory traversal, ThinkPHP invokeFunction abuse, and command execution patterns (wget/curl pipe to shell). Identifies opportunistic bot-driven RCE scanning and framework-specific exploit chaining against internet-exposed applications.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 12, 2026, 23:03 | Brute Force | SSH | SikkerGuard: 2 blocked packets |
| User | Mar 3, 2026, 10:40 | Brute Force | SSH | SikkerGuard: 4 blocked packets |
| User | Mar 1, 2026, 16:45 | Brute Force | SSH | SikkerGuard: 2 blocked packets |