Active Threat • MEDIUM
43.166.4.224
Country of Origin🇰🇷 South Korea
First Detection5/1/2026
Last Activity5/1/2026
ISPTencent Building, Kejizhongyi Avenue
🎯
214
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
19
Malware
Geolocation
- Country
- 🇰🇷 South Korea
- City
- Seoul
- ASN
- AS132203
- ISP
- Tencent Building, Kejizhongyi Avenue
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
🔐ubuntu/qwertyuio
1x🔐ftpserver/ftpserver
1x🔐admin/!234Qwer
1x🔐user/22222222
1x🔐root/test2018
1x🔐ftpuser/ftpuser12
1x🔐ubuntu/a11b12c13
1x🔐testftp/ftp123
1x🔐user/aa123456
1x🔐teste/1
1x🔐admin/oracle
1x🔐ftpuser/3245gs5662d34
1x🔐root/admin2024!@#
1x🔐ali/ali2024
1x🔐ubuntu/Cloud@123
1xExecuted Commands
$
Enter new UNIX password:2x$
ls -lh $(which ls)1x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x$
uname -a1x$
w1x$
cat /proc/cpuinfo | grep name | wc -l1x$
echo "ftpuser12\nM6DwUeTI1G1t\nM6DwUeTI1G1t\n"|passwd1x$
crontab -l1x$
cat /proc/cpuinfo | grep model | grep name | wc -l1x$
which ls1xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
80
CPEs
cpe:/a:f5:nginx
Risk Assessment
55
/100
LowMediumHighCritical