Check an IP Address, Domain Name, Subnet, or ASN
46.110.45.245 has a threat confidence score of 99%. This IP address from United States (AS30600, Metronet) has been observed in 51 honeypot sessions targeting TELNET, HTTP protocols. Detected attack patterns include http get ping cgi command injection wget arm7, http ping command injection download execute arm7, telnet shell escalation with busybox execution attempt. First observed on April 4, 2026, most recently active April 25, 2026.
HTTP GET request to /ping.cgi with command injection payload downloading and executing ARM7 binary via wget.
HTTP GET request exploiting pingIpAddress parameter command injection to download an ARM7 binary via wget, write it to /tmp, set executable permissions, and execute it.
Telnet session exhibiting privilege escalation and shell breakout commands (enable, system, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The sequence indicates an attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. The presence of an unknown BusyBox applet strongly suggests automated bot deployment logic rather than legitimate administrative activity.
HTTP request using GET method.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.