Check an IP Address, Domain Name, Subnet, or ASN
176.65.148.203 has a threat confidence score of 96%. This IP address from The Netherlands (AS51396, Pfcloud UG (haftungsbeschrankt)) has been observed in 922 honeypot sessions targeting HTTP, TELNET, SSH protocols. Detected attack patterns include telnet shell escalation with busybox execution attempt. First observed on February 8, 2026, most recently active April 18, 2026.
Telnet session exhibiting privilege escalation and shell breakout commands (enable, system, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The sequence indicates an attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. The presence of an unknown BusyBox applet strongly suggests automated bot deployment logic rather than legitimate administrative activity.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.