Check an IP Address, Domain Name, Subnet, or ASN
170.64.234.144 has a very high threat confidence level of 100%, originating from Sydney, Australia, on the DigitalOcean, LLC network (14061). It has been observed across 210 sessions targeting SSH, with detected attack patterns including ssh hardened host profiling and shell rc immutability bypass, First observed on March 3, 2026, most recently active March 5, 2026.
Identifies SSH post-auth activity combining resilient multi-source CPU enumeration (explicit /usr/bin/nproc fallback) with removal of the immutable flag from ~/.shellrc via chattr, indicating host profiling followed by shell configuration tampering for persistence preparation.
Identifies the use of SCP in quiet mode (-q) with “to” mode (-t), indicating the remote system is receiving a file. This pattern is commonly associated with post-authentication payload delivery, lateral movement staging, or tool transfer to a compromised host.