Active Threat • MEDIUM
185.239.239.67
🎯
261
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
21
Malware
Geolocation
- Country
- 🇩🇪 Germany
- City
- Unknown
- ASN
- AS206996
- ISP
- ZAP-Hosting GmbH
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
🔐345gs5662d34/345gs5662d34
2x🔐root/3245gs5662d34
2x🔐mcuser/mcuser
1x🔐ubuntu/ubuntu18!
1x🔐root/111...aaa
1x🔐test/lana
1x🔐root/Qwert789
1x🔐root/Aa112211.
1x🔐admin/Admin25
1x🔐root/Qazwsx4321#
1x🔐root/Abcd123@#
1x🔐root/nPSpP4PBW0
1x🔐root/P@ssw0rd.com
1x🔐root/qazwsx12345@
1x🔐ubuntu/Test2026!
1xExecuted Commands
$
cd ~; chattr -ia .ssh; lockr -ia .ssh2x$
free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'2x$
lscpu | grep Model2x$
ls -lh $(which ls)2x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'2x$
uname -a2x$
w2x$
cat /proc/cpuinfo | grep name | wc -l2x$
crontab -l2x$
cat /proc/cpuinfo | grep model | grep name | wc -l2xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
22
Hostnames
black-jellyfish-71162.zap.cloud
CPEs
cpe:/o:debian:debian_linuxcpe:/o:linux:linux_kernelcpe:/a:openbsd:openssh:10.0p2
Risk Assessment
55
/100
LowMediumHighCritical