Check an IP Address, Domain Name, Subnet, or ASN
213.199.57.161 has a threat confidence score of 95%. This IP address from France (AS51167, Contabo GmbH) has been observed in 4 honeypot sessions targeting HTTPS, HTTP, DOCKER protocols. Detected attack patterns include https multi vector web rce and payload execution attempt, http mass web rce exploitation scanning. First observed on April 4, 2026, most recently active April 5, 2026.
Sequence of requests including PHPUnit eval-stdin endpoint probing across multiple paths, PHP payload execution markers, PEAR config-create file write attempts, local file inclusion targeting /tmp/index1, direct shell access via /cgi-bin/bin/sh, and payload delivery using wget/curl piped to sh, indicating an automated multi-vector remote code execution and payload deployment attempt.
Coordinated automated exploitation attempts targeting public-facing web services, including PHPUnit eval-stdin access, PHP-CGI argument injection, Docker API exposure, directory traversal, ThinkPHP invokeFunction abuse, and command execution patterns (wget/curl pipe to shell). Identifies opportunistic bot-driven RCE scanning and framework-specific exploit chaining against internet-exposed applications.