Check an IP Address, Domain Name, Subnet, or ASN
213.244.94.193 has a very high threat confidence level of 89%, originating from Gaza, Palestine, on the Palestine Telecommunications Company (PALTEL) network (12975). It has been observed across 13 sessions targeting MYSQL, First observed on February 25, 2026, most recently active February 25, 2026.
Interactive post-access reconnaissance behavior that fingerprints the MySQL execution environment while actively validating query side effects. Combines server variable enumeration, timezone offset inference, and warning inspection to map configuration, regional context, and permission boundaries, and to detect suppressed errors or execution anomalies before attempting higher-risk operations.
Post-access reconnaissance behavior that fingerprints a MySQL server’s configuration and deployment context by enumerating server variables and deriving the local timezone offset. Used to infer database version, enabled features, security posture, filesystem layout, and regional or infrastructure-specific defaults to guide follow-on exploitation or data exfiltration strategy.