TROYANOSYVIRUS
Active ThreatHIGH

115.91.48.142

Country of Origin🇰🇷 South Korea
First Detection2/21/2026
Last Activity3/31/2026
ISPLG DACOM Corporation
🎯
1,206
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
34
Malware

Geolocation

Country
🇰🇷 South Korea
City
Anyang-si
ASN
AS3786
ISP
LG DACOM Corporation

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

🔐345gs5662d34/345gs5662d34
9x
🔐root/3245gs5662d34
3x
🔐transfer/transfer@123
1x
🔐simeon/Simeon123!
1x
🔐root/Mexico2026
1x
🔐vagrant/12345
1x
🔐sabrina/sabrina
1x
🔐minikube/minikubeminikube
1x
🔐arma3server/arma3server123
1x
🔐panel/Panel123!
1x
🔐luis/1234
1x
🔐root/111222333
1x
🔐root/321321
1x
🔐xx/xxxx
1x
🔐root/@root1234
1x

Executed Commands

$Enter new UNIX password:11x
$lockr -ia .ssh9x
$cat /proc/cpuinfo | grep model | grep name | wc -l9x
$ls -lh $(which ls)9x
$df -h | head -n 2 | awk 'FNR == 2 {print $2;}'9x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'9x
$free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'9x
$whoami9x
$uname -m9x
$lscpu | grep Model8x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Risk Assessment

65
/100
LowMediumHighCritical