Check an IP Address, Domain Name, Subnet, or ASN
165.154.138.107 has a threat confidence score of 91%. This IP address from Germany (AS135377, UCLOUD INFORMATION TECHNOLOGY HK LIMITED) has been observed in 268 honeypot sessions targeting HTTP, HTTPS, SMTP, FTP, REDIS and 7 other protocols. First observed on January 31, 2026, most recently active March 22, 2026.
FTP session where the client authenticates and performs repeated passive-mode directory listings while navigating directly into finance, HR, partner, vendor, and release paths such as /data/finance, /data/hr, /partners, and /pub/*, indicating targeted discovery of business-sensitive storage locations.
FTP session where an empty control-channel command is observed in conjunction with non-printable binary data on the control channel. This pattern reflects malformed or non-FTP-compliant input, commonly seen during TLS handshake attempts on plaintext endpoints, protocol confusion, or automated scanner misfires.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
Identifies HTTP GET requests directly targeting the /bad-request path, indicating automated or manual probing of application error-handling routes rather than legitimate navigation flow.