Check an IP Address, Domain Name, Subnet, or ASN
8.222.236.85 has a threat confidence score of 99%. This IP address from Singapore (AS45102, Alibaba US Technology Co., Ltd.) has been observed in 51 honeypot sessions targeting TELNET, SSH protocols. Detected attack patterns include ssh authorized keys persistence established, telnet shell breakout with busybox payload execution. First observed on January 28, 2026, most recently active March 28, 2026.
Removal of filesystem attribute protections from the user’s .ssh directory followed by deletion and recreation of the directory and insertion of a new public key into authorized_keys. This pattern reflects deliberate modification of SSH trust configuration to establish persistent key-based access.
Telnet session exhibiting privilege escalation and shell breakout attempts (enable, system, linuxshell, shell, sh) followed by execution of /bin/busybox with a non-standard or arbitrary applet name. The combination indicates an automated attempt to escape restricted CLI environments and execute a staged or randomly named payload via BusyBox. This pattern is characteristic of IoT/Linux bot deployment frameworks leveraging BusyBox as a universal execution wrapper.
Attempts to remove filesystem attribute protections (e.g., immutable flags via chattr -i/-a) from the user’s ~/.ssh directory. This pattern indicates preparatory activity to modify SSH trust configuration, commonly preceding insertion or replacement of authorized_keys for persistence.