Active Threat • MEDIUM
51.159.59.161
🎯
193
Total Attacks
🔌
1
Ports
📡
1
Attack Types
🦠
20
Malware
Geolocation
- Country
- 🇫🇷 France
- City
- Paris
- ASN
- AS12876
- ISP
- Scaleway SAS
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
🔐sammy/Sammy24!
1x🔐root/ZAQ!2wsx4321#
1x🔐cacti/cacti
1x🔐root/Qw@123456
1x🔐webuser/123qwe
1x🔐root/A123456/
1x🔐root/1qazxsw@
1x🔐dev/Dev20!
1x🔐sammy/Sammy18!
1x🔐test/ttest
1x🔐root/Qwer1234Qwer
1x🔐root/3245gs5662d34
1x🔐ubuntu/Admin1234!
1x🔐root/bbCC111
1x🔐test8/test8
1xExecuted Commands
$
lscpu | grep Model1x$
echo "root:JTfrougt9X6s"|chpasswd|bash1x$
ls -lh $(which ls)1x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x$
uname -a1x$
w1x$
cat /proc/cpuinfo | grep name | wc -l1x$
crontab -l1x$
cat /proc/cpuinfo | grep model | grep name | wc -l1x$
which ls1xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
222553808080
Vulnerabilities
CVE-2013-2220CVE-2024-3566CVE-2007-3205
Hostnames
mail.clientscgp.com
CPEs
cpe:/a:php:php:8.4.16cpe:/a:caddyserver:caddycpe:/o:linux:linux_kernelcpe:/a:golang:gocpe:/o:debian:debian_linuxcpe:/a:openbsd:openssh:10.0p2
Risk Assessment
55
/100
LowMediumHighCritical