Check an IP Address, Domain Name, Subnet, or ASN
220.119.14.146 has a threat confidence score of 87%. This IP address from South Korea (AS4766, Korea Telecom) has been observed in 15 honeypot sessions targeting TELNET protocols. Detected attack patterns include telnet busybox echo dropper execution chain, telnet busybox payload execution and cleanup. First observed on January 24, 2026, most recently active April 10, 2026.
Identifies post-authentication Telnet activity where BusyBox is used to stage a payload via echo redirection into a file, followed by multi-path shell execution (sh/system/linuxshell). Includes supporting commands such as directory navigation, network probing (ping), and firewall manipulation (iptables flush). Represents a scripted dropper-style execution workflow commonly used in automated botnet propagation and remote compromise.
Identifies post-authentication Telnet activity where an attacker leverages BusyBox to create a payload via echo redirection, enables shell execution, runs commands (sh/system/linuxshell), performs network actions (ping), modifies firewall rules (iptables flush), and removes artifacts via recursive hidden cleanup. Represents full payload staging, execution, and anti-forensics sequence typical of botnet propagation or remote access deployment.