Check an IP Address, Domain Name, Subnet, or ASN
176.65.132.7 has a threat confidence score of 97%. This IP address from Germany (AS51396, Pfcloud UG (haftungsbeschrankt)) has been observed in 74 honeypot sessions and reported 2 times targeting HTTPS, HTTP, SSH protocols. First observed on February 21, 2026, most recently active March 4, 2026.
Comprehensive post-access host reconnaissance over SSH focused on system fingerprinting and GPU capability validation. The activity enumerates OS and kernel details, CPU model and core count, uptime, interactive users, routing information, and performs conditional GPU detection via lspci or nvidia-smi. It also validates binary availability (e.g., kill) and performs external IP organization lookups. This pattern is consistent with operators assessing compute capacity (including GPU suitability), system stability, and execution environment before payload deployment such as cryptomining, AI workload abuse, or resource-intensive tooling.
Automated multipart form-data payload attempting prototype pollution against a Next.js / React Server Components deserialization context using __proto__ and constructor:constructor gadget references. Indicates staged remote code execution probing against Node.js-based public-facing applications.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 4, 2026, 02:10 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 3, 2026, 21:40 | Brute Force | HTTP | SikkerGuard: 4 blocked packets |