Loading threats
Pipes a numeric string into sudo -S to attempt execution of a hidden binary located at /.16 via bash -c. If the sudo execution fails, the command falls back to executing the same binary directly through bash -c. This command structure is commonly used in automated attack scripts to run a payload with elevated privileges when possible, while still ensuring execution if privilege escalation fails.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 62.171.133.1 | 94% | 5,459 | 5,285 | 🇩🇪 DE | AS51167 | 2026-03-09 |
| 161.35.90.112 | 91% | 2,811 | 372 | 🇳🇱 NL | AS14061 | 2026-02-08 |
| 104.248.87.23 | 75% | 1,569 | 399 | 🇳🇱 NL | AS14061 | 2026-03-01 |
| 146.190.20.104 | 76% | 1,448 | 209 | 🇳🇱 NL | AS14061 | 2026-02-26 |
| 188.166.41.118 | 90% | 1,400 | 182 | 🇳🇱 NL | AS14061 | 2026-02-08 |
| 159.65.147.12 | 81% | 160 | 144 | 🇮🇳 IN | AS14061 | 2026-02-26 |
| 46.101.181.190 | 75% | 52 | 52 | 🇩🇪 DE | AS14061 | 2026-02-27 |