Check an IP Address, Domain Name, Subnet, or ASN
66.179.9.227 has a threat confidence score of 100%. This IP address from Canada (AS1100, Nuday Networks Inc.) has been observed in 4,132 honeypot sessions and reported 111 times targeting POSTGRES protocols. Detected attack patterns include postgres copy from program execution chain. First observed on February 25, 2026, most recently active April 15, 2026.
Represents a complete, tightly scoped PostgreSQL exploitation chain where a client initiates a transaction, fingerprints the server version, prepares a temporary table, executes an external system command via COPY FROM PROGRAM, retrieves the command output, and immediately cleans up by dropping the table. This sequence is highly characteristic of automated post-authentication exploitation tooling that abuses PostgreSQL’s trusted language and program execution features for one-shot remote command execution, output capture, and minimal on-disk footprint. The rapid execution and cleanup indicate intent to execute payloads rather than interact with the database as a datastore.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 22, 2026, 13:40 | Brute Force | POSTGRES | SikkerGuard: 6 blocked packets |
| User | Mar 22, 2026, 08:27 | Brute Force | POSTGRES | SikkerGuard: 6 blocked packets |
| User | Mar 22, 2026, 03:34 | Brute Force | POSTGRES | SikkerGuard: 6 blocked packets |
| User | Mar 21, 2026, 22:21 | Brute Force | POSTGRES | SikkerGuard: 6 blocked packets |
| User | Mar 21, 2026, 17:18 | Brute Force | POSTGRES | SikkerGuard: 6 blocked packets |