TROYANOSYVIRUS
Active ThreatHIGH

129.159.149.21

Country of Origin🇮🇱 IL
First Detection4/6/2026
Last Activity4/15/2026
ISPOracle Corporation
🎯
301
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
9
Malware

Geolocation

Country
🇮🇱 IL
City
Jerusalem
ASN
AS31898
ISP
Oracle Corporation

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

🔐root/admin
4x
🔐root/root
4x
🔐root/guest
3x
🔐root/12345
3x
🔐test/test
2x
🔐root/ubuntu
2x
🔐root/test
2x
🔐root/toor
2x
🔐root/pfsense
2x
🔐root/123
2x
🔐root/qwerty
2x
🔐root/1234
2x
🔐root/5nWt3P-fF4WosQm5O
2x
🔐root/2glehe5t24th1issZs
2x
🔐root/hlL0mlNAabiR
2x

Executed Commands

$/ip cloud print6x
$uname -a3x
$ls -la ~/.local/share/TelegramDesktop/tdata /home/*/.local/share/TelegramDesktop/tdata /dev/ttyGSM* /dev/ttyUSB-mod* /var/spool/sms/* /var/log/smsd.log /etc/smsd.conf* /usr/bin/qmuxd /var/qmux_connect_socket /etc/config/simman /dev/modem* /var/config/sms/*3x
$ifconfig3x
$ps | grep '[Mm]iner'3x
$ps -ef | grep '[Mm]iner'3x
$echo Hi | cat -n3x
$locate D877F783D5D3EF8Cs3x
$cat /proc/cpuinfo3x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
22
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:openbsd:openssh:9.6p1

Risk Assessment

65
/100
LowMediumHighCritical