Check an IP Address, Domain Name, Subnet, or ASN
23.97.62.151 has a very high threat confidence level of 100%, originating from Singapore, Singapore, on the Microsoft Corporation network (8075). It has been observed across 54 sessions targeting SSH, with detected attack patterns including ssh comprehensive host reconnaissance sequence, ssh post auth system census with credential probe, First observed on February 2, 2026, most recently active February 2, 2026.
Identifies an SSH session performing broad system, network, identity, filesystem, and service enumeration in a single execution sequence. The behavior combines environment fingerprinting (kernel, CPU, uptime), user and credential surface inspection (/etc/passwd, /etc/shadow, history), network topology discovery (interfaces, routes, listening ports), process and service inventory, writable directory validation, and connectivity testing. This pattern reflects automated post-compromise host profiling used by botnets, cryptominers, and lateral-movement frameworks to determine system suitability and operational value.
Automated SSH session performing a structured full-system census following successful authentication. The activity enumerates kernel, hardware, memory, environment variables, network topology, listening services, running processes, mounted filesystems, and root directories while probing /etc/passwd and /etc/shadow, validating command availability, and performing temporary file write/delete tests. The pattern indicates scripted post-compromise host inventory and credential surface validation prior to persistence or payload deployment.