Check an IP Address, Domain Name, Subnet, or ASN
192.142.2.70 has a threat confidence score of 91%. This IP address from South Africa (AS6206, Netrouting B.V.) has been observed in 12 honeypot sessions targeting SMB, RDP protocols. Detected attack patterns include smb remote service stager via mshta. First observed on May 4, 2026, most recently active May 5, 2026.
Composite behavior indicating remote lateral movement over SMB followed by service-based execution of a staged payload delivered through mshta invoking msiexec from remote infrastructure. The sequence combines IPC$ share access, SAMR and SVCCTL RPC binding, service control pipe interaction, and remote command execution consistent with administrative service creation or modification to execute a downloaded installer. This pattern is strongly associated with hands-on-keyboard intrusion activity and automated lateral propagation frameworks leveraging Windows service execution for payload deployment.
Identifies RDP clients attempting authentication using Network Level Authentication (NLA) with the NTLM challenge-response protocol. This occurs during the CredSSP negotiation phase before a remote desktop session is established and indicates an active credential authentication attempt against the RDP service