TROYANOSYVIRUS
Active Threat β€’ HIGH

164.90.159.214

First Detection3/25/2026
Last Activity3/28/2026
ISPDigitalOcean, LLC
🎯
424
Total Attacks
πŸ”Œ
1
Ports
πŸ“‘
1
Attack Types
🦠
25
Malware

Geolocation

Country
πŸ‡ΊπŸ‡Έ United States
City
Santa Clara
ASN
AS14061
ISP
DigitalOcean, LLC

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

πŸ”345gs5662d34/345gs5662d34
4x
πŸ”root/3245gs5662d34
2x
πŸ”root/zhuzhu
1x
πŸ”root/git123
1x
πŸ”root/Root1234!@#$
1x
πŸ”sky/12345678
1x
πŸ”root/shihming
1x
πŸ”wilson/Wilson123
1x
πŸ”root/zaq12wsX
1x
πŸ”wilson/3245gs5662d34
1x
πŸ”root/Admin@000
1x
πŸ”root/110120259
1x
πŸ”root/Adm1n12345
1x
πŸ”nasuser/1234
1x
πŸ”root/qwerty!23
1x

Executed Commands

$lockr -ia .ssh4x
$uname -m4x
$top4x
$free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'4x
$cd ~; chattr -ia .ssh; lockr -ia .ssh4x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'4x
$uname -a4x
$w4x
$ls -lh $(which ls)4x
$cat /proc/cpuinfo | grep name | wc -l4x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
22808090
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/o:linux:linux_kernelcpe:/a:openbsd:openssh:9.9p1cpe:/a:f5:nginx:1.26.3

Risk Assessment

62
/100
LowMediumHighCritical