TROYANOSYVIRUS
Amenaza ActivaMEDIO

152.32.130.144

Pais de Origen🇭🇰 Hong Kong
Primera Deteccion14/4/2026
Ultima Actividad14/4/2026
ISPUCLOUD INFORMATION TECHNOLOGY HK LIMITED
🎯
161
Ataques Totales
🔌
1
Puertos
📡
1
Tipos Ataque
🦠
19
Malware

Geolocalizacion

Pais
🇭🇰 Hong Kong
Ciudad
Hong Kong
ASN
AS135377
ISP
UCLOUD INFORMATION TECHNOLOGY HK LIMITED

Tipos de Ataque

ssh_telnet_honeypot

Puertos Atacados

22

Malware Asociado

Credenciales Intentadas

🔐deploy/1234
1x
🔐minecraft/minecraftpassword
1x
🔐root/root05!
1x
🔐ubuntu/testing
1x
🔐amir/123
1x
🔐oracle/Oracle!2025
1x
🔐amir/3245gs5662d34
1x
🔐marcus/marcus
1x
🔐root/Login1
1x
🔐user1/root
1x
🔐flip/flip
1x
🔐root/3edc4rfv
1x
🔐claude/claude4
1x
🔐user/11111
1x
🔐ubuntu/3245gs5662d34
1x

Comandos Ejecutados

$Enter new UNIX password:2x
$ls -lh $(which ls)1x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x
$uname -a1x
$w1x
$cat /proc/cpuinfo | grep name | wc -l1x
$crontab -l1x
$cat /proc/cpuinfo | grep model | grep name | wc -l1x
$echo -e "asd123\nwZAprm1DYG5Z\nwZAprm1DYG5Z"|passwd|bash1x
$which ls1x

Exposicion segun Shodan InternetDBShodan

Datos de InternetDB, actualizacion no en tiempo real

Puertos
22804438443944330001
Vulnerabilidades
CVE-2023-48795CVE-2018-20685CVE-2025-23419CVE-2025-26465CVE-2021-3618CVE-2007-2768CVE-2023-38408CVE-2023-51385CVE-2021-41617CVE-2020-14145CVE-2019-6111CVE-2019-6110CVE-2021-36368CVE-2020-15778CVE-2017-15906CVE-2025-32728CVE-2008-3844CVE-2023-51767CVE-2016-20012CVE-2023-44487
Hostnames
jump.152621.xyz
CPEs
cpe:/a:f5:nginx:1.20.1cpe:/a:openbsd:openssh:7.4

Evaluacion de Riesgo

55
/100
BajoMedioAltoCritico
IP 152.32.130.144 - Amenaza Detectada | TroyanosYVirus.com | TroyanosYVirus.com