Execution of cat /etc/ssh/sshd_config 2>/dev/null to read the OpenSSH daemon configuration file while suppressing error output. This pattern reflects SSH service configuration discovery, commonly performed after shell access to assess authentication settings, permitted login methods, port configuration, or other security controls relevant to persistence or lateral movement.
This attack primitive is part of the SikkerAPI detection catalog and is actively monitored across our global honeypot network. No IPs in the current retention window have triggered this detection signature.
When an attacker triggers this primitive, matched IPs will appear here with confidence scores, geolocation, and session details. Browse other SSH detections or look up a specific IP to check its threat profile.