Check an IP Address, Domain Name, Subnet, or ASN
165.154.164.92 has a threat confidence score of 98%. This IP address from Germany (AS135377, UCLOUD INFORMATION TECHNOLOGY HK LIMITED) has been observed in 392 honeypot sessions and reported 1 times targeting FTP, SMTP, SIP, HTTPS, SSH and 7 other protocols. First observed on January 20, 2026, most recently active April 21, 2026.
SIP request using sip:nm as the Request-URI, a malformed or placeholder target commonly observed in SIP scanning and fuzzing activity rather than legitimate client behavior.
FTP session where a client probes for valid usernames, attempts authentication, switches to ASCII mode, and enters passive mode without performing explicit file listing or transfer operations. This reflects a completed login and session setup sequence, often observed during credential validation or preparatory access prior to further activity.
FTP session where the client authenticates and performs repeated passive-mode directory listings while navigating directly into finance, HR, partner, vendor, and release paths such as /data/finance, /data/hr, /partners, and /pub/*, indicating targeted discovery of business-sensitive storage locations.
FTP session where an empty control-channel command is observed in conjunction with non-printable binary data on the control channel. This pattern reflects malformed or non-FTP-compliant input, commonly seen during TLS handshake attempts on plaintext endpoints, protocol confusion, or automated scanner misfires.
HTTPS request to /robots.txt.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 12, 2026, 09:18 | Brute Force | SMB | SikkerGuard: 2 blocked packets |