Check an IP Address, Domain Name, Subnet, or ASN
206.189.222.234 has a threat confidence score of 89%. This IP address from United States (AS14061, DigitalOcean, LLC) has been observed in 96 honeypot sessions targeting REDIS, MONGODB, RDP, HTTP, HTTPS and 3 other protocols. Detected attack patterns include http git repository config exposure probe. First observed on February 27, 2026, most recently active March 28, 2026.
Identifies HTTP GET requests targeting /.git/config, indicating attempts to access exposed Git repository configuration files. Successful access may enable repository reconstruction, credential harvesting, or source code disclosure.
Identifies RDP clients attempting authentication using Network Level Authentication (NLA) with the NTLM challenge-response protocol. This occurs during the CredSSP negotiation phase before a remote desktop session is established and indicates an active credential authentication attempt against the RDP service
FTP session where a client probes for valid usernames, attempts authentication, switches to ASCII mode, and enters passive mode without performing explicit file listing or transfer operations. This reflects a completed login and session setup sequence, often observed during credential validation or preparatory access prior to further activity.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.