Check an IP Address, Domain Name, Subnet, or ASN
5.141.80.206 has a threat confidence score of 94%. This IP address from Russia (AS12389, Rostelecom) has been observed in 81 honeypot sessions targeting TELNET protocols. Detected attack patterns include telnet shell escalation with busybox execution attempt, interactive execution and privilege probe. First observed on January 27, 2026, most recently active March 23, 2026.
Telnet session exhibiting privilege escalation and shell breakout commands (enable, system, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The sequence indicates an attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. The presence of an unknown BusyBox applet strongly suggests automated bot deployment logic rather than legitimate administrative activity.
Post_auth reconnaissance and escalation behavior that sequentially establishes shell access, probes available interpreters and BusyBox tooling, and attempts to enter privileged execution mode to determine full command and control capabilities of the target environment