Loading threats
Identifies a Telnet session where BusyBox is leveraged to activate or access a shell environment (sh, shell, system, linuxshell, enable) followed by command capability validation (ping). This pattern reflects deliberate shell breakout and execution-context validation commonly observed in IoT botnets and embedded Linux compromise workflows. The presence of multiple shell invocation variants combined with BusyBox applet usage indicates adaptive execution logic rather than incidental command usage.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 81.183.52.47 | 100% | 2,313 | 2,282 | 🇭🇺 HU | AS5483 | 2026-02-27 |
| 185.17.65.131 | 99% | 1,128 | 1,108 | 🇲🇩 MD | AS62013 | 2026-02-27 |
| 43.230.192.174 | 100% | 970 | 970 | 🇰🇭 KH | AS23673 | 2026-03-03 |
| 125.25.229.243 | 100% | 905 | 850 | 🇹🇭 TH | AS23969 | 2026-02-21 |
| 125.25.231.153 | 99% | 895 | 838 | 🇹🇭 TH | AS23969 | 2026-02-22 |
| 216.98.209.16 | 86% | 828 | 17 | 🇧🇷 BR | AS266207 | 2026-02-20 |
| 180.122.142.200 | 99% | 813 | 813 | 🇨🇳 CN | AS4134 | 2026-02-26 |
| 31.182.113.89 | 99% | 722 | 722 | 🇵🇱 PL | AS16342 | 2026-02-26 |
| 103.42.163.220 | 96% | 645 | 137 | 🇮🇳 IN | AS58678 | 2026-02-23 |
| 186.251.92.162 | 97% | 635 | 33 | 🇧🇷 BR | AS52624 | 2026-02-22 |
| 61.30.72.55 | 99% | 623 | 623 | 🇹🇼 TW | AS9924 | 2026-02-25 |
| 91.204.250.64 | 100% | 611 | 611 | 🇮🇹 IT | AS203540 | 2026-02-26 |
| 210.89.55.61 | 99% | 603 | 347 | 🇮🇳 IN | AS134674 | 2026-02-24 |
| 177.152.98.147 | 99% | 601 | 47 | 🇧🇷 BR | AS270585 | 2026-02-20 |
| 210.89.34.114 | 99% | 599 | 305 | 🇮🇳 IN | AS134674 | 2026-02-25 |
| 114.32.42.83 | 99% | 544 | 544 | 🇹🇼 TW | AS3462 | 2026-02-27 |
| 200.152.22.54 | 91% | 522 | 16 | 🇧🇷 BR | AS28590 | 2026-02-21 |
| 45.230.220.138 | 97% | 496 | 37 | 🇧🇷 BR | AS267184 | 2026-02-21 |
| 186.237.171.118 | 99% | 489 | 49 | 🇧🇷 BR | AS262813 | 2026-02-21 |
| 125.25.228.90 | 99% | 472 | 472 | 🇹🇭 TH | AS23969 | 2026-02-21 |