Active Threat β’ MEDIUM
142.171.168.165
Country of OriginπΊπΈ United States
First Detection3/29/2026
Last Activity3/29/2026
ISPMULTACOM CORPORATION
π―
307
Total Attacks
π
1
Ports
π‘
1
Attack Types
π¦
22
Malware
Geolocation
- Country
- πΊπΈ United States
- City
- Los Angeles
- ASN
- AS35916
- ISP
- MULTACOM CORPORATION
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
πroot/3245gs5662d34
3xπ345gs5662d34/345gs5662d34
3xπroot/fjbdfdjkdsfs541544@@
1xπroot/1q2w3eazsxdc
1xπroot/alexandr
1xπroot/pwd@12345
1xπroot/Qx123456
1xπroot/zxcv!@#123
1xπroot/!Q@W1q2w
1xπroot/2wsx@WSX3edc
1xπroot/01234
1xπroot/123qweASD!@
1xπroot/Password$123456
1xπroot/Q!W@E#R$T%
1xπroot/lovelore111
1xExecuted Commands
$
lscpu | grep Model3x$
rm -rf /tmp/secure.sh; rm -rf /tmp/auth.sh; pkill -9 secure.sh; pkill -9 auth.sh; echo > /etc/hosts.deny; pkill -9 sleep;3x$
free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'3x$
cd ~; chattr -ia .ssh; lockr -ia .ssh3x$
ls -lh $(which ls)3x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'3x$
uname -a3x$
w3x$
cat /proc/cpuinfo | grep name | wc -l3x$
crontab -l3xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
22
Hostnames
229-111-74-198-dedicated.multacom.com
CPEs
cpe:/a:openbsd:openssh:8.9p1cpe:/o:canonical:ubuntu_linux
Risk Assessment
55
/100
LowMediumHighCritical