Check an IP Address, Domain Name, Subnet, or ASN
47.243.150.134 has a threat confidence score of 100%. This IP address from Hong Kong (AS45102, Alibaba US Technology Co., Ltd.) has been observed in 119 honeypot sessions targeting RDP, SMB, MSSQL protocols. Detected attack patterns include smb remcom remote command execution, smb remcom stdout pipe access. First observed on February 24, 2026, most recently active April 7, 2026.
Identifies PsExec/RemCom-style remote command execution over SMB, involving IPC$ share access, service control manager pipe interaction (svcctl), and communication via the RemCom named pipe. This behavior reflects authenticated lateral movement and remote process execution through Windows administrative shares.
SMB session accessing a RemCom_stdout* named pipe following IPC$ share access, indicating interaction with a RemCom-style remote command execution channel.
Identifies RDP clients attempting authentication using Network Level Authentication (NLA) with the NTLM challenge-response protocol. This occurs during the CredSSP negotiation phase before a remote desktop session is established and indicates an active credential authentication attempt against the RDP service
Detects authenticated access to the IPC$ administrative share over SMB. This behavior indicates remote interaction with Windows inter-process communication mechanisms and is commonly observed during lateral movement, service enumeration, or preparation for remote command execution.