Check an IP Address, Domain Name, Subnet, or ASN
85.223.233.38 has a very high threat confidence level of 100%, originating from Dnipro, Ukraine, on the Kyivstar PJSC network (15895). It has been observed across 2,754 sessions targeting SMB, with detected attack patterns including svcctl remote service execution, smb remote service stager via mshta, First observed on January 21, 2026, most recently active March 2, 2026.
SMB session creating and binding to the svcctl pipe, opening the Service Control Manager via OpenSCManagerW, creating a service with an mshta.exe VBScript payload, starting it via StartServiceW, then deleting it via DeleteService.
Composite behavior indicating remote lateral movement over SMB followed by service-based execution of a staged payload delivered through mshta invoking msiexec from remote infrastructure. The sequence combines IPC$ share access, SAMR and SVCCTL RPC binding, service control pipe interaction, and remote command execution consistent with administrative service creation or modification to execute a downloaded installer. This pattern is strongly associated with hands-on-keyboard intrusion activity and automated lateral propagation frameworks leveraging Windows service execution for payload deployment.