Check an IP Address, Domain Name, Subnet, or ASN
5.16.181.160 has a threat confidence score of 100%. This IP address from Russia (AS31363, JSC ER-Telecom Holding) has been observed in 47 honeypot sessions and reported 3 times targeting TELNET protocols. Detected attack patterns include telnet busybox shell activation with capability check, telnet busybox multi method payload retrieval and execution. First observed on February 16, 2026, most recently active March 19, 2026.
Identifies a Telnet session where BusyBox is leveraged to activate or access a shell environment (sh, shell, system, linuxshell, enable) followed by command capability validation (ping). This pattern reflects deliberate shell breakout and execution-context validation commonly observed in IoT botnets and embedded Linux compromise workflows. The presence of multiple shell invocation variants combined with BusyBox applet usage indicates adaptive execution logic rather than incidental command usage.
Identifies a Telnet session where an attacker leverages BusyBox utilities to retrieve a remote payload using one or more file transfer mechanisms (e.g., wget, curl, ftpget, or tftp) followed by execution of the downloaded script via sh. This pattern is consistent with IoT botnet propagation and automated malware deployment.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 19, 2026, 23:16 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |
| User | Mar 15, 2026, 18:15 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |
| User | Mar 9, 2026, 02:42 | Brute Force | TELNET | SikkerGuard: 2 blocked packets |