TROYANOSYVIRUS
Active ThreatMEDIUM

162.55.94.103

Country of Origin🇩🇪 Germany
First Detection4/12/2026
Last Activity4/13/2026
ISPHetzner Online GmbH
🎯
1,475
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
4
Malware

Geolocation

Country
🇩🇪 Germany
City
Falkenstein
ASN
AS24940
ISP
Hetzner Online GmbH

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

🔐root/1qaz@WSX3edc
2x
🔐root/1234qwer
2x
🔐root/123456Aa
2x
🔐root/1q2w3e
2x
🔐root/1qazxsw2!@
2x
🔐root/Super123
2x
🔐root/Admin123456
2x
🔐root/1qazxcde3
2x
🔐root/Changeme123
2x
🔐root/1q2w3e!Q@W#E
2x
🔐root/1234Qwer
2x
🔐root/a123456
2x
🔐root/Qwer1234
2x
🔐root/!QAZ2wsx3edc
2x
🔐root/3edcxzaq1
2x

Executed Commands

$hostname1x
$free -h | head -21x
$pwd1x
$df -h | head -51x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
222580111123443
Vulnerabilities
CVE-2021-3618CVE-2021-23017CVE-2023-44487CVE-2025-23419
Hostnames
api.durst.shopappsrv1.durst.shop
CPEs
cpe:/a:postfix:postfixcpe:/a:ntp:ntp:3cpe:/a:f5:nginx:1.18.0cpe:/a:openbsd:openssh:8.9p1cpe:/o:linux:linux_kernelcpe:/o:canonical:ubuntu_linux

Risk Assessment

50
/100
LowMediumHighCritical