TROYANOSYVIRUS
Active ThreatMEDIUM

206.189.53.8

Country of Origin🇩🇪 Germany
First Detection4/27/2026
Last Activity4/27/2026
ISPDigitalOcean, LLC
🎯
154
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
19
Malware

Geolocation

Country
🇩🇪 Germany
City
Frankfurt am Main
ASN
AS14061
ISP
DigitalOcean, LLC

Attack Types

ssh_telnet_honeypot

Attacked Ports

22

Associated Malware

Attempted Credentials

🔐root/12qw12qw
1x
🔐root/Qaz123456@
1x
🔐root/pass@word123$%^
1x
🔐root/123abc
1x
🔐bbs/bbsroot
1x
🔐tangwenhao/root512
1x
🔐root/1!2!3!
1x
🔐root/hy@bas5200
1x
🔐root/P@$$vords1234
1x
🔐root/123cxzdsaewq
1x
🔐root/1QaZ2WsX!@
1x
🔐root/4121284911e84cc8s0a0d4i4
1x
🔐root/disaisi@2026
1x
🔐tangwenhao/3245gs5662d34
1x
🔐root/nokia
1x

Executed Commands

$Enter new UNIX password:2x
$ls -lh $(which ls)1x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x
$uname -a1x
$echo "root512\n46LzwVIf4MDv\n46LzwVIf4MDv\n"|passwd1x
$w1x
$cat /proc/cpuinfo | grep name | wc -l1x
$crontab -l1x
$cat /proc/cpuinfo | grep model | grep name | wc -l1x
$which ls1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
22567868818080
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:n8n:n8ncpe:/a:openbsd:openssh:10.0p2cpe:/a:nodejs:nodejs

Risk Assessment

55
/100
LowMediumHighCritical