Check an IP Address, Domain Name, Subnet, or ASN
64.89.163.89 has a threat confidence score of 100%. This IP address from United Kingdom (AS401626, Netiface America, Inc.) has been observed in 4,315 honeypot sessions and reported 5 times targeting MYSQL protocols. Detected attack patterns include mysql pre extortion valuation and ransom drop, mysql ransom extortion workflow, mysql targeted database destruction and 1 more. First observed on February 10, 2026, most recently active March 17, 2026.
Performs a structured MySQL extortion workflow that first disables autocommit and calculates database size via information_schema to assess data value, then enumerates tables, creates a ransom table, inserts explicit extortion messages with payment instructions, and commits the transaction—clearly indicating intentional database extortion following valuation.
Performs a coordinated sequence of MySQL actions to create and select a ransom-themed database and table, insert extortion markers, and explicitly manage transactions, clearly signaling database compromise and intent to extort the owner
Explicitly disables autocommit, then deliberately drops multiple named databases and commits the transaction, indicating intentional and controlled destructive activity against specific MySQL databases rather than reconnaissance or misconfiguration.
A transactional sequence where autocommit is disabled, the MySQL SHUTDOWN command is issued, and the transaction is committed. This pattern represents an authenticated user intentionally terminating the MySQL server process, resulting in immediate database service disruption or denial of service.
A transactional sequence where autocommit is disabled, database privileges (INSERT, DELETE, CREATE, DROP) are revoked from a user on a target database, privilege tables are flushed, and the transaction is committed. This pattern indicates deliberate modification of MySQL access control, potentially used to restrict or alter another account’s capabilities after gaining database access.
Disables MySQL autocommit mode without performing any follow-up actions, indicating an initial transaction manipulation probe or a failed/aborted attempt to prepare multi-step database operations. Often seen in low-confidence automation or disrupted attack flows.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 15, 2026, 15:33 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 14, 2026, 20:16 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 9, 2026, 20:34 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 7, 2026, 20:42 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 6, 2026, 22:12 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |