Check an IP Address, Domain Name, Subnet, or ASN
192.42.116.95 has a threat confidence score of 83%. This IP address from The Netherlands (AS215125, Church of Cyberology) has been observed in 74 honeypot sessions targeting POSTGRES, SMB, SSH, HTTP, RTSP and 2 other protocols. This IP is a known Tor exit node. First observed on March 4, 2026, most recently active April 18, 2026.
Client performs a full RTSP interaction sequence — OPTIONS, DESCRIBE, SETUP, and PLAY — indicating an attempt to initialize and access a media stream. This pattern reflects active interaction with a streaming service rather than simple probing, and is commonly seen when automated tools or unauthorized clients try to view exposed camera or RTSP feeds.
Client performs a full RTSP interaction sequence — OPTIONS, DESCRIBE, SETUP, and PLAY — indicating an attempt to initialize and access a media stream. This pattern reflects active interaction with a streaming service rather than simple probing, and is commonly seen when automated tools or unauthorized clients try to view exposed camera or RTSP feeds.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
HTTP request using GET method.