Active Threat β’ HIGH
45.61.52.18
Country of OriginπΊπΈ United States
First Detection4/4/2026
Last Activity4/9/2026
ISPKamatera, Inc.
π―
304
Total Attacks
π
1
Ports
π‘
1
Attack Types
π¦
19
Malware
Geolocation
- Country
- πΊπΈ United States
- City
- Los Angeles
- ASN
- AS36007
- ISP
- Kamatera, Inc.
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
πteamspeak/Teamspeak09!
1xπubuntu/Root@2024
1xπwww/123
1xπroot/Qwe123-
1xπodoo/Odoo12
1xπroot/Abc12345.
1xπroot/Root2021!!
1xπroot/qazwsx888!@#
1xπhuang/123456
1xπftptest/ftptest123
1xπwp-user/test
1xπroot/Qwer#$
1xπoracle/ubuntu
1xπubuntu/ubuntu2023
1xπclaude/claude!@
1xExecuted Commands
$
Enter new UNIX password:2x$
ls -lh $(which ls)1x$
echo -e "Vpn123456\nGJOOAr1i5r8u\nGJOOAr1i5r8u"|passwd|bash1x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x$
uname -a1x$
w1x$
cat /proc/cpuinfo | grep name | wc -l1x$
crontab -l1x$
cat /proc/cpuinfo | grep model | grep name | wc -l1x$
which ls1xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
221080
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:openbsd:openssh:8.9p1
Risk Assessment
62
/100
LowMediumHighCritical