TROYANOSYVIRUS
Active ThreatCRITICAL

150.95.30.186

Country of Origin🇹🇭 Thailand
First Detection1/21/2026
Last Activity4/1/2026
ISPGMO-Z com NetDesign Holdings Co., Ltd.
🎯
637
Total Attacks
🔌
66
Ports
📡
2
Attack Types
🦠
23
Malware

Geolocation

Country
🇹🇭 Thailand
City
Bangkok
ASN
AS135161
ISP
GMO-Z com NetDesign Holdings Co., Ltd.

Attack Types

ssh_telnet_honeypot
tcp_trap

Attacked Ports

2215773243356948364998946210189110341120711592122121224712547151191716417286181421831718958+46

Associated Malware

Attempted Credentials

🔐root/3245gs5662d34
4x
🔐345gs5662d34/345gs5662d34
4x
🔐root/fjbdfdjkdsfs541544@@
2x
🔐root/root123#
1x
🔐root/passW0rd
1x
🔐root/Qweasd!@#
1x
🔐root/Computer12
1x
🔐root/1qwe2qaz
1x
🔐root/Az123456
1x
🔐root/Win2024
1x
🔐root/ZAQ!zaq1
1x
🔐root/Server123
1x
🔐root/Gy123456
1x
🔐root/admin#0
1x
🔐root/root@admin123
1x

Executed Commands

$cd ~; chattr -ia .ssh; lockr -ia .ssh4x
$ls -lh $(which ls)4x
$uname -m4x
$rm -rf /tmp/secure.sh; rm -rf /tmp/auth.sh; pkill -9 secure.sh; pkill -9 auth.sh; echo > /etc/hosts.deny; pkill -9 sleep;4x
$free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'4x
$lscpu | grep Model4x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'4x
$uname -a4x
$w4x
$cat /proc/cpuinfo | grep name | wc -l4x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
212253801101434434655879932082208320873306
Vulnerabilities
CVE-2017-15906CVE-2018-20685CVE-2018-15919CVE-2023-51767CVE-2020-14145CVE-2019-6111CVE-2019-6109CVE-2016-20012CVE-2021-36368CVE-2008-3844CVE-2023-38408CVE-2019-6110CVE-2007-2768CVE-2025-32728CVE-2020-15778CVE-2023-51385CVE-2023-48795CVE-2021-41617CVE-2018-15473CVE-2025-26465
Hostnames
mtw.com.mmwww.mtw.com.mmv150-95-30-186.a005.g.bkk1.static.cnode.io
CPEs
cpe:/a:openbsd:openssh:7.4cpe:/a:oracle:mysqlcpe:/a:pureftpd:pure-ftpdcpe:/a:cpanel:whmcpe:/a:apache:http_servercpe:/a:exim:exim:4.99.1cpe:/a:cpanel:cpanel

Risk Assessment

90
/100
LowMediumHighCritical