TROYANOSYVIRUS
Active ThreatLOW

164.90.234.149

Country of Origin🇩🇪 Germany
First Detection4/29/2026
Last Activity4/29/2026
ISPDigitalOcean, LLC
🎯
41
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
1
Malware

Geolocation

Country
🇩🇪 Germany
City
Frankfurt am Main
ASN
AS14061
ISP
DigitalOcean, LLC

Attack Types

ssh_telnet_honeypot

Attacked Ports

23

Associated Malware

Attempted Credentials

🔐Call-ID: 50000/CSeq: 42 OPTIONS
1x
🔐Max-Forwards: 70/Content-Length: 0
1x
🔐Contact: <sip:nm@nm>/Accept: application/sdp
1x
🔐From: <sip:nm@nm>;tag=root/To: <sip:nm2@nm2>
1x
🔐OPTIONS / HTTP/1.0/(empty)
1x
🔐GET / HTTP/1.0/(empty)
1x
🔐OPTIONS / RTSP/1.0/(empty)
1x
🔐OPTIONS sip:nm SIP/2.0/Via: SIP/2.0/TCP nm;branch=foo
1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
443
Vulnerabilities
CVE-2022-36760CVE-2009-0796CVE-2025-65082CVE-2023-31122CVE-2012-4001CVE-2022-28614CVE-2021-44224CVE-2021-33193CVE-2021-26691CVE-2024-38473CVE-2021-32785CVE-2021-32786CVE-2020-1934CVE-2025-53020CVE-2024-42516CVE-2025-55753CVE-2020-11022CVE-2023-38709CVE-2013-0942CVE-2025-23048
Hostnames
cconnect.i-ways-network.org
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:apache:http_server:2.4.41cpe:/a:jquery:jquery:2.1.1cpe:/a:getbootstrap:bootstrap

Risk Assessment

25
/100
LowMediumHighCritical