Loading threats
Executes a SELECT * FROM <table> query to retrieve all rows and columns from a specific PostgreSQL table. In a honeypot context, this primitive represents direct data access following table discovery or creation, and is commonly observed during verification steps in automated exploitation chains, data exfiltration attempts, or post-execution checks where an attacker is confirming that staged output or payload results were successfully written and can be read back.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 154.16.112.232 | 100% | 322,340 | 54,085 | 🇺🇸 US | AS14670 | 2026-03-02 |
| 208.97.53.150 | 100% | 27,926 | 4,227 | 🇺🇸 US | AS30247 | 2026-02-24 |
| 212.113.98.30 | 100% | 14,068 | 3,322 | 🇷🇺 RU | AS206134 | 2026-03-03 |
| 178.250.186.28 | 99% | 11,102 | 2,010 | 🇷🇺 RU | AS207957 | 2026-03-03 |
| 157.230.55.143 | 100% | 6,849 | 2,935 | 🇺🇸 US | AS14061 | 2026-03-02 |
| 164.90.155.248 | 100% | 6,797 | 2,830 | 🇺🇸 US | AS14061 | 2026-03-02 |
| 157.230.250.115 | 100% | 6,703 | 2,875 | 🇸🇬 SG | AS14061 | 2026-03-02 |
| 144.217.252.80 | 100% | 6,558 | 2,799 | 🇨🇦 CA | AS16276 | 2026-03-02 |
| 143.198.94.28 | 100% | 6,537 | 2,940 | 🇸🇬 SG | AS14061 | 2026-03-02 |
| 209.15.110.13 | 100% | 6,515 | 2,886 | 🇹🇭 TH | AS135566 | 2026-03-02 |
| 103.81.100.222 | 100% | 6,493 | 2,782 | 🇮🇩 ID | AS58475 | 2026-03-02 |
| 77.222.63.226 | 100% | 6,464 | 2,866 | 🇷🇺 RU | AS44112 | 2026-03-02 |
| 103.236.108.25 | 100% | 6,440 | 2,867 | 🇮🇳 IN | AS132925 | 2026-03-02 |
| 167.172.104.27 | 100% | 6,431 | 2,823 | 🇩🇪 DE | AS14061 | 2026-03-02 |
| 62.217.122.251 | 100% | 6,413 | 2,851 | 🇬🇷 GR | AS5408 | 2026-03-02 |
| 137.184.65.234 | 100% | 6,361 | 2,785 | 🇺🇸 US | AS14061 | 2026-03-02 |
| 91.90.213.175 | 100% | 6,305 | 2,879 | 🇷🇺 RU | AS57487 | 2026-03-02 |
| 128.199.197.130 | 100% | 6,300 | 2,884 | 🇸🇬 SG | AS14061 | 2026-03-02 |
| 45.55.174.23 | 100% | 6,292 | 2,842 | 🇺🇸 US | AS14061 | 2026-03-02 |
| 83.212.174.61 | 100% | 6,285 | 2,846 | 🇬🇷 GR | AS5408 | 2026-03-02 |