TROYANOSYVIRUS
Active ThreatHIGH

140.238.179.182

Country of Origin🇧🇷 Brazil
First Detection4/5/2026
Last Activity4/7/2026
ISPOracle Corporation
🎯
290
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
21
Malware

Geolocation

Country
🇧🇷 Brazil
City
São Paulo
ASN
AS31898
ISP
Oracle Corporation

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

🔐ubuntu/Welcome!@#123
1x
🔐root/qazwsx1234$
1x
🔐liu/3245gs5662d34
1x
🔐suriya/suriya
1x
🔐root/qazwsx2023#$
1x
🔐suriya/3245gs5662d34
1x
🔐ubuntu/Aa123456@
1x
🔐root/!QAZ7ujm
1x
🔐sally/sally
1x
🔐root/server@123
1x
🔐user/asd
1x
🔐sumit/sumit
1x
🔐root/P@ssword.
1x
🔐test9/test
1x
🔐ruslan/ruslan123
1x

Executed Commands

$Enter new UNIX password:4x
$lscpu | grep Model2x
$cd ~; chattr -ia .ssh; lockr -ia .ssh2x
$lockr -ia .ssh2x
$top2x
$uname -m2x
$free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'2x
$ls -lh $(which ls)2x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'2x
$uname -a2x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
2253808112344380530008001
Hostnames
sp6.magen.in
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:openresty:openrestycpe:/a:ntp:ntp:4cpe:/a:expressjs:expresscpe:/a:getbootstrap:bootstrapcpe:/a:f5:nginxcpe:/a:jquery:jquerycpe:/a:nodejs:node.jscpe:/a:openbsd:openssh:8.9p1

Risk Assessment

60
/100
LowMediumHighCritical