Check an IP Address, Domain Name, Subnet, or ASN
91.132.160.202 has a threat confidence score of 95%. This IP address from Germany (AS213520, Senko Digital LLC) has been observed in 11 honeypot sessions targeting SSH, HTTP, HTTPS, DOCKER protocols. Detected attack patterns include ssh authorized keys persistence established, ssh automated post compromise recon and persistence chain, http mass web rce exploitation scanning. First observed on February 21, 2026, most recently active March 18, 2026.
Removal of filesystem attribute protections from the user’s .ssh directory followed by deletion and recreation of the directory and insertion of a new public key into authorized_keys. This pattern reflects deliberate modification of SSH trust configuration to establish persistent key-based access.
Identifies an SSH session performing comprehensive automated host reconnaissance (CPU, memory, disk, processes, users), followed by credential modification and SSH key manipulation consistent with scripted post-compromise takeover and persistence establishment.
Coordinated automated exploitation attempts targeting public-facing web services, including PHPUnit eval-stdin access, PHP-CGI argument injection, Docker API exposure, directory traversal, ThinkPHP invokeFunction abuse, and command execution patterns (wget/curl pipe to shell). Identifies opportunistic bot-driven RCE scanning and framework-specific exploit chaining against internet-exposed applications.