Check an IP Address, Domain Name, Subnet, or ASN
45.33.102.195 has a threat confidence score of 80%. This IP address from United States (AS63949, Akamai Connected Cloud) has been observed in 96 honeypot sessions targeting MONGODB, HTTPS, RDP, FTP, HTTP and 1 other protocols. First observed on March 2, 2026, most recently active March 29, 2026.
Identifies RDP clients attempting authentication using Network Level Authentication (NLA) with the NTLM challenge-response protocol. This occurs during the CredSSP negotiation phase before a remote desktop session is established and indicates an active credential authentication attempt against the RDP service
FTP session where a client probes for valid usernames, attempts authentication, switches to ASCII mode, and enters passive mode without performing explicit file listing or transfer operations. This reflects a completed login and session setup sequence, often observed during credential validation or preparatory access prior to further activity.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration