Check an IP Address, Domain Name, Subnet, or ASN
219.150.93.157 has a very high threat confidence level of 100%, originating from China, on the ASN for TIANJIN Provincial Net of CT network (17638). It has been observed across 352 sessions targeting SSH, with detected attack patterns including ssh authorized keys persistence established, ssh automated post compromise recon and persistence chain, ssh interactive environment profiling with access consolidation, First observed on January 20, 2026, most recently active March 2, 2026.
Removal of filesystem attribute protections from the user’s .ssh directory followed by deletion and recreation of the directory and insertion of a new public key into authorized_keys. This pattern reflects deliberate modification of SSH trust configuration to establish persistent key-based access.
Identifies an SSH session performing comprehensive automated host reconnaissance (CPU, memory, disk, processes, users), followed by credential modification and SSH key manipulation consistent with scripted post-compromise takeover and persistence establishment.
Identifies an SSH session performing multi-method system profiling (CPU model extraction, memory and disk inspection, active user/process monitoring), followed by SSH key replacement and password update indicative of interactive access validation and consolidation rather than single-shot automated takeover.