Check an IP Address, Domain Name, Subnet, or ASN
64.89.163.154 has a threat confidence score of 100%. This IP address from United Kingdom (AS401626, Netiface America, Inc.) has been observed in 4,858 honeypot sessions and reported 8 times targeting MYSQL protocols. Detected attack patterns include mysql ransom extortion workflow, mysql pre extortion valuation and ransom drop, mysql targeted database destruction and 2 more. First observed on January 24, 2026, most recently active March 20, 2026.
Performs a coordinated sequence of MySQL actions to create and select a ransom-themed database and table, insert extortion markers, and explicitly manage transactions, clearly signaling database compromise and intent to extort the owner
Performs a structured MySQL extortion workflow that first disables autocommit and calculates database size via information_schema to assess data value, then enumerates tables, creates a ransom table, inserts explicit extortion messages with payment instructions, and commits the transaction—clearly indicating intentional database extortion following valuation.
Explicitly disables autocommit, then deliberately drops multiple named databases and commits the transaction, indicating intentional and controlled destructive activity against specific MySQL databases rather than reconnaissance or misconfiguration.
Adversary creates and switches to a newly generated database, creates ransom-related tables, inserts ransom marker content, and commits transactional changes while optionally disabling autocommit. The sequence includes table enumeration and structured write operations indicative of database-level ransomware staging or defacement activity intended to persist extortion instructions or disrupt normal data availability.
A transactional sequence where autocommit is disabled, the MySQL SHUTDOWN command is issued, and the transaction is committed. This pattern represents an authenticated user intentionally terminating the MySQL server process, resulting in immediate database service disruption or denial of service.
A transactional sequence where autocommit is disabled, database privileges (INSERT, DELETE, CREATE, DROP) are revoked from a user on a target database, privilege tables are flushed, and the transaction is committed. This pattern indicates deliberate modification of MySQL access control, potentially used to restrict or alter another account’s capabilities after gaining database access.
Disables MySQL autocommit mode without performing any follow-up actions, indicating an initial transaction manipulation probe or a failed/aborted attempt to prepare multi-step database operations. Often seen in low-confidence automation or disrupted attack flows.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 20, 2026, 02:54 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 11, 2026, 22:11 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 4, 2026, 11:41 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 3, 2026, 11:10 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 2, 2026, 20:10 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |