TROYANOSYVIRUS
Active Threat β€’ MEDIUM

192.3.1.46

First Detection5/3/2026
Last Activity5/3/2026
ISPHostPapa
🎯
1,654
Total Attacks
πŸ”Œ
1
Ports
πŸ“‘
1
Attack Types
🦠
1
Malware

Geolocation

Country
πŸ‡ΊπŸ‡Έ United States
City
Buffalo
ASN
AS36352
ISP
HostPapa

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

πŸ”frappe/frappe
2x
πŸ”www/123456
1x
πŸ”grid/grid
1x
πŸ”test/test!@
1x
πŸ”elasticsearch/elasticsearch
1x
πŸ”aiuser/aiuser
1x
πŸ”user10/user10
1x
πŸ”root/root@123
1x
πŸ”admin1/admin1
1x
πŸ”nexus/nexus
1x
πŸ”vbox/123456
1x
πŸ”centos/centos
1x
πŸ”fastuser/fastuser
1x
πŸ”minecraft/123456
1x
πŸ”cursor/cursor
1x

Executed Commands

$uname -s -v -n -r -m4x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
2122258044358799399577778888
Vulnerabilities
CVE-2023-42116CVE-2023-42119CVE-2023-51766CVE-2023-42114CVE-2022-37451CVE-2022-3620CVE-2025-23419CVE-2023-42115CVE-2023-42117CVE-2025-67896CVE-2024-39929CVE-2022-3559
Hostnames
192-3-1-46-host.colocrossing.com
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:f5:nginxcpe:/a:exim:exim:4.95cpe:/a:f5:nginx:1.26.2cpe:/a:openbsd:openssh:8.9p1

Risk Assessment

45
/100
LowMediumHighCritical