Loading threats
Post-access host reconnaissance performed over SSH to evaluate system capabilities and confirm shell privilege context. The activity fingerprints the operating system and kernel, determines CPU architecture and core count, checks for GPU presence, enumerates interactive users, extracts network routing information, validates the hosting organization via external IP lookup, and confirms the current execution identity. This pattern is commonly observed after initial access when attackers assess whether the compromised host is suitable for compute-intensive workloads, lateral movement, or payload deployment.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 186.96.145.241 | 99% | 28,958 | 27,812 | 🇲🇽 MX | AS22884 | 2026-03-19 |
| 187.191.2.213 | 100% | 5,276 | 1,040 | 🇲🇽 MX | AS22884 | 2026-03-17 |
| 170.64.177.23 | 100% | 941 | 941 | 🇦🇺 AU | AS14061 | 2026-03-15 |
| 209.38.24.183 | 99% | 889 | 889 | 🇦🇺 AU | AS14061 | 2026-03-07 |
| 184.174.33.105 | 96% | 101 | 101 | 🇫🇷 FR | AS51167 | 2026-03-19 |
| 170.64.191.68 |
| 98% |
| 90 |
| 78 |
| 🇦🇺 AU |
| AS14061 |
| 2026-03-15 |
| 170.64.185.235 | 97% | 83 | 83 | 🇦🇺 AU | AS14061 | 2026-03-07 |
| 187.191.2.214 | 88% | 70 | 70 | 🇲🇽 MX | AS22884 | 2026-03-19 |
| 170.64.188.24 | 67% | 11 | 11 | 🇦🇺 AU | AS14061 | 2026-03-07 |
| 134.199.164.96 | 67% | 5 | 5 | 🇦🇺 AU | AS14061 | 2026-03-07 |