Loading threats
FTP session where a client probes for valid users, attempts authentication, negotiates transfer modes (ASCII/Binary), enumerates the /reports directory, and attempts to upload info.zip in passive mode. This sequence reflects an authenticated file placement attempt following directory discovery, consistent with staged content deployment onto a writable path.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 213.145.146.50 | 100% | 1,030 | 157 | 🇰🇬 KG | AS12997 | 2026-03-12 |
| 58.181.99.122 | 93% | 338 | 338 | 🇵🇰 PK | AS45595 | 2026-04-14 |
| 185.203.236.250 | 97% | 287 | 56 | 🇺🇿 UZ | AS8193 | 2026-02-23 |
| 80.72.179.223 | 94% | 286 | 55 | 🇰🇬 KG | AS12997 | 2026-02-28 |
| 45.124.146.216 | 89% | 58 | 58 | 🇮🇳 IN | AS133255 | 2026-03-11 |
| 45.120.59.157 | 95% | 41 | 41 | 🇮🇳 IN | AS59191 | 2026-03-27 |
| 217.29.24.170 | 95% | 33 | 33 | 🇰🇬 KG | AS29061 | 2026-03-14 |
| 149.40.210.91 | 94% | 25 | 21 | 🇵🇰 PK | AS45669 | 2026-02-18 |
| 84.54.70.61 | 90% | 23 | 17 | 🇺🇿 UZ | AS8193 | 2026-02-18 |
| 195.158.22.9 | 96% | 22 | 22 | 🇺🇿 UZ | AS8193 | 2026-04-14 |
| 223.123.32.43 | 91% | 22 | 22 | 🇵🇰 PK | AS138423 | 2026-04-01 |
| 39.32.174.249 | 94% | 21 | 21 | 🇵🇰 PK | AS17557 | 2026-03-26 |
| 103.110.102.20 | 94% | 21 | 21 | 🇮🇳 IN | AS133001 | 2026-03-22 |
| 185.213.230.21 | 94% | 21 | 21 | 🇺🇿 UZ | AS64466 | 2026-03-26 |
| 116.113.133.242 | 94% | 21 | 21 | 🇨🇳 CN | AS139007 | 2026-03-05 |
| 198.163.205.76 | 94% | 21 | 21 | 🇺🇿 UZ | AS8193 | 2026-04-14 |
| 144.124.199.206 | 94% | 21 | 21 | 🇺🇿 UZ | AS8193 | 2026-04-10 |
| 91.188.129.137 | 94% | 21 | 21 | 🇺🇿 UZ | AS42017 | 2026-03-28 |
| 178.122.65.24 | 94% | 21 | 21 | 🇧🇾 BY | AS6697 | 2026-03-28 |
| 176.123.241.178 | 94% | 21 | 21 | 🇰🇬 KG | AS41750 | 2026-04-08 |