TROYANOSYVIRUS
Active ThreatHIGH

164.92.145.220

Country of Origin🇳🇱 Netherlands
First Detection4/13/2026
Last Activity4/14/2026
ISPDigitalOcean, LLC
🎯
192
Total Attacks
🔌
2
Ports
📡
2
Attack Types
🦠
19
Malware

Geolocation

Country
🇳🇱 Netherlands
City
Amsterdam
ASN
AS14061
ISP
DigitalOcean, LLC

Attack Types

ssh_telnet_honeypot
tcp_trap

Attacked Ports

2261111

Associated Malware

Attempted Credentials

🔐user/User10!
1x
🔐parham/123456
1x
🔐steam/changeme
1x
🔐root/0.0.0.0.
1x
🔐webuser/P@ssw0rd
1x
🔐root/0206
1x
🔐integration/integration
1x
🔐root/qazwsx0000.
1x
🔐root/senha123
1x
🔐dev/dev12345
1x
🔐steam/3245gs5662d34
1x
🔐ubuntu/ubuntu24!
1x
🔐user/user26
1x
🔐user8/123
1x
🔐root/ahmed123
1x

Executed Commands

$Enter new UNIX password:2x
$echo -e "changeme\ndBP96ixO7G74\ndBP96ixO7G74"|passwd|bash1x
$ls -lh $(which ls)1x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x
$echo "changeme\ndBP96ixO7G74\ndBP96ixO7G74\n"|passwd1x
$uname -a1x
$w1x
$cat /proc/cpuinfo | grep name | wc -l1x
$crontab -l1x
$cat /proc/cpuinfo | grep model | grep name | wc -l1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
21222553110143587888993
Hostnames
elvon.dev
CPEs
cpe:/a:openbsd:openssh:9.6p1cpe:/a:apache:http_servercpe:/a:pureftpd:pure-ftpdcpe:/o:canonical:ubuntu_linuxcpe:/a:postfix:postfix

Risk Assessment

70
/100
LowMediumHighCritical