Loading threats
Shell command iptables -F used to flush all rules from the active firewall chains. This action removes existing packet filtering rules, effectively disabling firewall enforcement until rules are restored. In compromised environments, it is commonly observed when an actor attempts to remove network restrictions, ensure unrestricted outbound access, or weaken host-based defenses.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 223.123.38.36 | 100% | 26,234 | 1,065 | 🇵🇰 PK | AS138423 | 2026-03-02 |
| 103.184.56.249 | 97% | 25,666 | 196 | 🇮🇩 ID | AS149667 | 2026-02-25 |
| 103.156.221.253 | 97% | 25,219 | 195 | 🇮🇩 ID | AS149667 | 2026-02-26 |
| 103.184.56.241 | 97% | 22,537 | 177 | 🇮🇩 ID | AS149667 | 2026-02-23 |
| 103.224.125.60 | 93% | 5,022 | 37 | 🇮🇩 ID | AS150197 | 2026-02-09 |
| 103.156.221.242 | 91% | 1,695 | 30 | 🇮🇩 ID | AS149667 | 2026-03-01 |
| 103.184.56.220 | 84% | 1,592 | 42 | 🇮🇩 ID | AS149667 | 2026-02-19 |
| 119.179.250.117 | 85% | 1,362 | 25 | 🇨🇳 CN | AS4837 | 2026-02-03 |
| 103.156.221.241 | 92% | 1,340 | 15 | 🇮🇩 ID | AS149667 | 2026-02-01 |
| 82.42.209.185 | 85% | 1,074 | 14 | 🇬🇧 GB | AS5089 | 2026-02-26 |
| 111.220.67.53 | 86% | 1,025 | 13 | 🇦🇺 AU | AS9443 | 2026-02-25 |
| 109.196.219.116 | 85% | 958 | 12 | 🇷🇺 RU | AS50439 | 2026-03-01 |
| 195.154.182.97 | 83% | 956 | 10 | 🇫🇷 FR | AS12876 | 2026-03-01 |
| 71.105.248.81 | 87% | 921 | 15 | 🇺🇸 US | AS701 | 2026-03-01 |
| 104.7.193.137 | 90% | 920 | 6 | 🇺🇸 US | AS7018 | 2026-02-21 |
| 108.173.69.139 | 87% | 870 | 14 | 🇨🇦 CA | AS852 | 2026-03-02 |
| 95.172.180.29 | 86% | 859 | 11 | 🇵🇹 PT | AS15457 | 2026-02-26 |
| 49.158.200.168 | 86% | 855 | 15 | 🇹🇼 TW | AS24163 | 2026-03-02 |
| 110.159.174.43 | 84% | 849 | 11 | 🇲🇾 MY | AS4788 | 2026-02-19 |
| 85.74.67.97 | 87% | 830 | 13 | 🇬🇷 GR | AS6799 | 2026-03-03 |