Active Threat • MEDIUM
1.95.13.173
Country of Origin🇨🇳 China
First Detection4/16/2026
Last Activity4/16/2026
ISPHuawei Cloud Service data center
🎯
145
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
15
Malware
Geolocation
- Country
- 🇨🇳 China
- City
- Guiyang
- ASN
- AS55990
- ISP
- Huawei Cloud Service data center
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
🔐steam/Steam!2025
1x🔐oracleuser/oracleuser
1x🔐oracle/oracle01
1x🔐root/Qy123456
1x🔐steam/3245gs5662d34
1x🔐server/server19
1x🔐aman/aman@123
1x🔐ubuntu/qweasd
1x🔐nexus/nexus!123
1x🔐root/root321#$
1x🔐xtest/123456
1x🔐user/ftpuser
1x🔐stperez/123456
1x🔐trading/trading
1x🔐oracle/oracle16
1xExecuted Commands
$
Enter new UNIX password:2x$
echo "Steam!2025\nXYZo8A4Ptd7g\nXYZo8A4Ptd7g\n"|passwd1x$
ls -lh $(which ls)1x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x$
uname -a1x$
w1x$
cat /proc/cpuinfo | grep name | wc -l1x$
crontab -l1x$
cat /proc/cpuinfo | grep model | grep name | wc -l1x$
which ls1xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
19000
Hostnames
ecs-1-95-13-173.compute.hwclouds-dns.com
CPEs
cpe:/a:amazon:elastic_load_balancing
Risk Assessment
55
/100
LowMediumHighCritical