Check an IP Address, Domain Name, Subnet, or ASN
167.86.121.168 has a threat confidence score of 100%. This IP address from France (AS51167, Contabo GmbH) has been observed in 348 honeypot sessions and reported 1 times targeting TELNET, HTTP, HTTPS protocols. Detected attack patterns include http cgibin mainfunction wget mips exec, telnet shell escalation with busybox execution attempt. First observed on February 19, 2026, most recently active March 27, 2026.
HTTP GET request to /cgibin/mainfunction.cgi with action=login and keyPath executing wget of memory_load.mips followed by chmod 777 and shell execution.
Telnet session exhibiting privilege escalation and shell breakout commands (enable, system, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The sequence indicates an attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. The presence of an unknown BusyBox applet strongly suggests automated bot deployment logic rather than legitimate administrative activity.
HTTP request using GET method.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 19, 2026, 15:01 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |