TROYANOSYVIRUS
Active ThreatCRITICAL

64.227.181.88

Country of Origin🇮🇳 India
First Detection3/27/2026
Last Activity4/5/2026
ISPDigitalOcean, LLC
🎯
151
Total Attacks
🔌
7
Ports
📡
2
Attack Types
🦠
20
Malware

Geolocation

Country
🇮🇳 India
City
Bengaluru
ASN
AS14061
ISP
DigitalOcean, LLC

Attack Types

ssh_telnet_honeypot
tcp_trap

Attacked Ports

2222662339392288443002263000

Associated Malware

Attempted Credentials

🔐root/P@ssw0rd777
1x
🔐root/Password6
1x
🔐root/linux321
1x
🔐root/P@ssw0rd2025~
1x
🔐root/qwe@1234
1x
🔐root/3245gs5662d34
1x
🔐root/Server!2025
1x
🔐root/one
1x
🔐root/iddqd
1x
🔐root/z1x2c3v4b5n6m7
1x
🔐root/nitin@123
1x
🔐root/solutions
1x
🔐root/!Password
1x
🔐root/P@ssw0rd81
1x
🔐root/host@123
1x

Executed Commands

$lscpu | grep Model1x
$ls -lh $(which ls)1x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x
$uname -a1x
$w1x
$cat /proc/cpuinfo | grep name | wc -l1x
$echo "root:NE2PDgJ3ws83"|chpasswd|bash1x
$crontab -l1x
$cat /proc/cpuinfo | grep model | grep name | wc -l1x
$which ls1x

Shodan InternetDB ExposureShodan

InternetDB data, not real-time

Ports
803001
Vulnerabilities
CVE-2023-44487CVE-2025-23419
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/o:linux:linux_kernelcpe:/a:f5:nginx:1.24.0

Risk Assessment

85
/100
LowMediumHighCritical