Active Threat • MEDIUM
202.61.193.254
🎯
165
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
17
Malware
Geolocation
- Country
- 🇩🇪 Germany
- City
- Nuremberg
- ASN
- AS197540
- ISP
- netcup GmbH
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
🔐cloud/12345
1x🔐sftp-user/Sftp-User123!
1x🔐root/Hello@1234
1x🔐mongod/123456
1x🔐kafka/Kafka123
1x🔐csserver/12345678
1x🔐silva/password
1x🔐root/qqqqqq
1x🔐vm/vm1234
1x🔐clawd/123456
1x🔐soporte/soporte123!
1x🔐chrism/chrism123
1x🔐root/Abc12345678@
1x🔐cardano/3245gs5662d34
1x🔐ws/Ws123
1xExecuted Commands
$
Enter new UNIX password:2x$
echo "cardano123\nlUdwbEhY2fYh\nlUdwbEhY2fYh\n"|passwd1x$
ls -lh $(which ls)1x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x$
uname -a1x$
w1x$
cat /proc/cpuinfo | grep name | wc -l1x$
echo -e "cardano123\nlUdwbEhY2fYh\nlUdwbEhY2fYh"|passwd|bash1x$
whoami1x$
df -h | head -n 2 | awk 'FNR == 2 {print $2;}'1xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
22443
Vulnerabilities
CVE-2025-23419CVE-2023-44487
Hostnames
v2202504270629336832.megasrv.deadmin.hayseller.am
CPEs
cpe:/o:linux:linux_kernelcpe:/a:f5:nginx:1.24.0cpe:/o:canonical:ubuntu_linuxcpe:/a:openbsd:openssh:9.6p1
Risk Assessment
55
/100
LowMediumHighCritical