Check an IP Address, Domain Name, Subnet, or ASN
80.94.92.184 has a very high threat confidence level of 100%, originating from Romania, on the Unmanaged Ltd network (47890). It has been observed across 12,048 sessions targeting SSH, with detected attack patterns including dual source gpu validation with host context, pci and nvidia gpu identification with host metadata, First observed on January 23, 2026, most recently active March 3, 2026.
Combined execution of lspci (VGA and 3D controller extraction and device count) and nvidia-smi -q (product name extraction and non-empty count validation), together with kernel/architecture (uname -s -v -n -r -m) and uptime collection. This pattern reflects cross-validation of GPU presence using both PCI-level and NVIDIA driver-level queries, enriched with host system context.
Execution of uname -s -v -n -r -m to collect kernel and architecture details, uptime -p for system uptime, lspci queries to extract and count VGA-class PCI devices, and nvidia-smi -q filtering for product name to identify NVIDIA GPU models. This pattern reflects layered GPU identification using both PCI enumeration and NVIDIA driver-level queries, combined with basic host system metadata collection.
Execution of uname -s -v -n -r -m to retrieve kernel and architecture details, uptime -p for human-readable system uptime, and lspci | grep VGA | cut -f5- -d ' ' to extract VGA-class PCI device information. This pattern reflects lightweight host profiling combined with basic GPU identification.
Execution of uname -s -v -n -r -m to collect kernel and architecture details, uptime -p for human-readable system uptime, and lspci queries to extract VGA-class PCI device descriptions and count the number of VGA devices. This pattern reflects PCI-level GPU identification combined with basic host system metadata collection.
Identifies SSH sessions where the actor performs structured hardware reconnaissance including CPU core enumeration, GPU detection via nvidia-smi, VGA/3D controller inspection via lspci, system uptime queries, and kernel/architecture fingerprinting to assess computational capabilities of the compromised host.
| Date | Category | Protocol | Comment |
|---|---|---|---|
| Feb 28, 2026 | Brute Force | SSH | SikkerGuard: 2 blocked packets |
| Feb 26, 2026 | Brute Force | SSH | SikkerGuard: 2 blocked packets |
| Feb 26, 2026 | Brute Force | SSH | SikkerGuard: 2 blocked packets |