Loading threats
Adversary creates and switches to a newly generated database, creates ransom-related tables, inserts ransom marker content, and commits transactional changes while optionally disabling autocommit. The sequence includes table enumeration and structured write operations indicative of database-level ransomware staging or defacement activity intended to persist extortion instructions or disrupt normal data availability.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 64.89.163.179 | 100% | 37,471 | 6,641 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.180 | 100% | 35,215 | 7,124 | 🇬🇧 GB | AS401626 | 2026-03-21 |
| 64.89.163.152 | 100% | 23,348 | 4,676 | 🇬🇧 GB | AS401626 | 2026-03-19 |
| 64.89.163.139 | 100% | 22,308 | 6,801 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.141 | 100% | 22,295 | 6,105 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.178 | 100% | 21,598 | 5,603 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.138 | 100% | 20,339 | 5,748 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.140 | 100% | 19,947 | 5,028 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.146 | 100% | 18,234 | 5,427 | 🇬🇧 GB | AS401626 | 2026-03-19 |
| 64.89.163.149 | 100% | 17,861 | 3,807 | 🇬🇧 GB | AS401626 | 2026-03-19 |
| 64.89.163.148 | 100% | 17,409 | 4,175 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.158 | 100% | 17,167 | 4,179 | 🇬🇧 GB | AS401626 | 2026-03-18 |
| 64.89.163.167 | 100% | 16,181 | 5,787 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.144 | 100% | 15,960 | 4,391 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.165 | 100% | 15,777 | 6,081 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.145 | 100% | 15,533 | 5,612 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.166 | 100% | 15,418 | 4,911 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.159 | 100% | 15,035 | 5,087 | 🇬🇧 GB | AS401626 | 2026-03-20 |
| 64.89.163.143 | 100% | 14,666 | 3,882 | 🇬🇧 GB | AS401626 | 2026-03-21 |
| 64.89.163.169 | 100% | 14,548 | 3,549 | 🇬🇧 GB | AS401626 | 2026-03-20 |