Check an IP Address, Domain Name, Subnet, or ASN
194.163.148.66 has a threat confidence score of 94%. This IP address from France (AS51167, Contabo GmbH) has been observed in 13 honeypot sessions and reported 1 times targeting HTTP, TELNET protocols. Detected attack patterns include telnet shell escalation with busybox execution attempt, http goform webslogin probe and auth attempt. First observed on February 19, 2026, most recently active March 17, 2026.
Telnet session exhibiting privilege escalation and shell breakout commands (enable, system, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The sequence indicates an attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. The presence of an unknown BusyBox applet strongly suggests automated bot deployment logic rather than legitimate administrative activity.
Sequence of requests including probing activity and access to /goform/websLogin, followed by a credential submission (user_name and password), indicating an authentication attempt against a router or embedded device login endpoint.
Identifies HTTP GET requests directly targeting the /bad-request path, indicating automated or manual probing of application error-handling routes rather than legitimate navigation flow.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 11, 2026, 12:24 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |