Loading threats
Identifies reading of /proc/cpuinfo with stderr suppressed, filtered for the model name field, and truncated to the first occurrence. This pattern extracts the CPU model identifier while limiting output volume. The combination of filtering and truncation strongly indicates scripted hardware fingerprinting rather than interactive inspection.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 123.58.209.118 | 100% | 5,852 | 1,482 | 🇭🇰 HK | AS135377 | 2026-03-20 |
| 106.12.75.58 | 100% | 3,799 | 3,793 | 🇨🇳 CN | AS38365 | 2026-03-19 |
| 190.123.65.197 | 100% | 3,450 | 3,283 | 🇧🇷 BR | AS271344 | 2026-03-20 |
| 213.125.209.110 | 100% | 1,643 | 1,541 | 🇳🇱 NL | AS33915 | 2026-03-19 |
| 189.23.51.162 | 100% | 1,458 | 1,454 | 🇧🇷 BR | AS4230 | 2026-02-22 |
| 219.151.187.97 | 100% | 730 | 333 | 🇨🇳 CN | AS134420 | 2026-03-10 |
| 31.128.34.159 | 100% | 290 | 290 | 🇱🇻 LV | AS9002 | 2026-02-19 |
| 196.191.116.218 | 100% | 210 | 194 | 🇪🇹 ET | AS24757 | 2026-03-19 |
| 36.189.253.33 | 95% | 112 | 99 | 🇨🇳 CN | AS9808 | 2026-03-11 |
| 196.204.221.118 | 95% | 8 | 8 | 🇪🇬 EG | AS24835 | 2026-03-02 |
| 102.205.237.2 | 92% | 7 | 7 | 🇰🇪 KE | AS329535 | 2026-03-20 |