Check an IP Address, Domain Name, Subnet, or ASN
5.63.107.38 has a threat confidence score of 87%. This IP address from Kazakhstan (AS9198, JSC Kazakhtelecom) has been observed in 62 honeypot sessions and reported 1 times targeting SMB, MSSQL protocols. First observed on January 20, 2026, most recently active March 22, 2026.
MSSQL session sequence performing automated server reconnaissance through multiple sp_server_info calls, case-sensitivity probing, charset and configuration enumeration from master.dbo tables, and session environment adjustments (set textsize, set arithabort on). The observed queries indicate scripted capability discovery and environment profiling based strictly on database command activity.
Identifies a coordinated Microsoft SQL Server reconnaissance sequence where the client sets session options (SET ARITHABORT ON, SET TEXTSIZE), invokes sp_server_info, performs a case-sensitivity probe, and enumerates syscharsets. This tightly grouped activity pattern reflects automated environment fingerprinting and configuration discovery typically executed immediately after successful connection to an exposed MSSQL service. The behavior is indicative of tooling-driven reconnaissance to assess server configuration, collation behavior, and encoding characteristics prior to follow-on exploitation or credential abuse.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 3, 2026, 03:10 | Brute Force | SMB | SikkerGuard: 2 blocked packets |