TROYANOSYVIRUS
Active Threat β€’ HIGH

143.198.235.14

First Detection4/5/2026
Last Activity4/7/2026
ISPDigitalOcean, LLC
🎯
195
Total Attacks
πŸ”Œ
2
Ports
πŸ“‘
2
Attack Types
🦠
20
Malware

Geolocation

Country
πŸ‡ΊπŸ‡Έ United States
City
Santa Clara
ASN
AS14061
ISP
DigitalOcean, LLC

Attack Types

ssh_telnet_honeypot
tcp_trap

Attacked Ports

221224

Associated Malware

Attempted Credentials

πŸ”root/Root1234567@#
1x
πŸ”vpsuser/123456
1x
πŸ”root/ZZxx1234
1x
πŸ”root/ZAQ!@#
1x
πŸ”claude/Claude22!
1x
πŸ”ftpuser/Ftpuser14!
1x
πŸ”root/!QAZ@WSX3edc
1x
πŸ”root/3245gs5662d34
1x
πŸ”info/admin123
1x
πŸ”root/123123.com
1x
πŸ”mailtest/test123
1x
πŸ”admin/admin26
1x
πŸ”root/ZAQ!2wsx2020@#
1x
πŸ”root/Qazwsx112233
1x
πŸ”debian/1
1x

Executed Commands

$lscpu | grep Model1x
$ls -lh $(which ls)1x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x
$uname -a1x
$echo "root:8ZCTqjcnT9vm"|chpasswd|bash1x
$w1x
$cat /proc/cpuinfo | grep name | wc -l1x
$crontab -l1x
$cat /proc/cpuinfo | grep model | grep name | wc -l1x
$which ls1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Risk Assessment

70
/100
LowMediumHighCritical