Check an IP Address, Domain Name, Subnet, or ASN
193.142.146.230 has a threat confidence score of 100%. This IP address from Germany (AS213438, ColocaTel Inc.) has been observed in 12,022 honeypot sessions and reported 96 times targeting DOCKER, HTTP, HTTPS protocols. Detected attack patterns include docker remote exec via api. First observed on January 20, 2026, most recently active April 13, 2026.
Attacker interaction with an exposed Docker Engine API resulting in container enumeration followed by remote command execution inside running containers. The sequence of GET /containers/json and subsequent POST /containers/{id}/exec and /exec/{id}/start calls represents deliberate hands-on-keyboard activity where the adversary uses the Docker daemon as a control plane to execute commands, deploy payloads, or pivot further within the host environment. This behavior reflects active container abuse observed directly through high-interaction honeypot instrumentation.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
HTTP request using GET method.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 14, 2026, 17:55 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 14, 2026, 14:43 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 14, 2026, 07:43 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 14, 2026, 03:46 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 14, 2026, 24:39 | Brute Force | — | SikkerGuard: 2 blocked packets |