TROYANOSYVIRUS
Active Threat β€’ MEDIUM

179.43.186.223

Country of OriginπŸ‡¨πŸ‡­ CH
First Detection3/28/2026
Last Activity4/11/2026
ISPPrivate Layer INC
🎯
254
Total Attacks
πŸ”Œ
2
Ports
πŸ“‘
2
Attack Types
🦠
0
Malware

Geolocation

Country
πŸ‡¨πŸ‡­ CH
City
RΓΌmlang
ASN
AS51852
ISP
Private Layer INC

Attack Types

elasticsearch_honeypot
malware_capture

Attacked Ports

33069200

Associated Malware

No associated malware

Attempted Credentials

πŸ”root/(empty)
187x
πŸ”admin/(empty)
10x
πŸ”rooT/(empty)
2x
πŸ”Airroot/(empty)
2x
πŸ”Root/(empty)
2x
πŸ”Password/(empty)
1x
πŸ”Admin/(empty)
1x
πŸ”10000/(empty)
1x
πŸ”rootersepticservices/(empty)
1x
πŸ”ubnt/(empty)
1x
πŸ”2087/(empty)
1x
πŸ”neelsbar/(empty)
1x
πŸ”2086/(empty)
1x
πŸ”nsroot/(empty)
1x

ThreatFox Intelabuse.ch

⚠️KNOWN C2 SERVER
Malware Families
win.cobalt_strike
Threat Types
botnet_cc
Confidence: 100%

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
22
Hostnames
hostedby.privatelayer.com
CPEs
cpe:/a:openbsd:openssh:9.2p1cpe:/o:debian:debian_linuxcpe:/o:linux:linux_kernel

Risk Assessment

55
/100
LowMediumHighCritical