TROYANOSYVIRUS
Active Threat β€’ MEDIUM

172.171.233.230

First Detection4/14/2026
Last Activity4/14/2026
ISPMicrosoft Corporation
🎯
168
Total Attacks
πŸ”Œ
1
Ports
πŸ“‘
1
Attack Types
🦠
19
Malware

Geolocation

Country
πŸ‡ΊπŸ‡Έ United States
City
Washington
ASN
AS8075
ISP
Microsoft Corporation

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

πŸ”root/123.ZXCV
1x
πŸ”root/root123123@
1x
πŸ”root/Hx123456
1x
πŸ”ubuntu/P@ssw0rd3
1x
πŸ”teamspeak/Teamspeak0
1x
πŸ”deploy/P@$$w0rd
1x
πŸ”bot/bot!@#
1x
πŸ”ubuntu/P@ssword24
1x
πŸ”deployer/abc123
1x
πŸ”root/zabbix
1x
πŸ”root/ddXX1234
1x
πŸ”bot/bot07
1x
πŸ”deploy/Frappe0
1x
πŸ”info/test
1x
πŸ”root/qazwsx11111@
1x

Executed Commands

$Enter new UNIX password:2x
$ls -lh $(which ls)1x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x
$uname -a1x
$w1x
$cat /proc/cpuinfo | grep name | wc -l1x
$crontab -l1x
$cat /proc/cpuinfo | grep model | grep name | wc -l1x
$which ls1x
$uname1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Risk Assessment

55
/100
LowMediumHighCritical