Active Threat β’ MEDIUM
66.103.198.91
Country of OriginπΊπΈ United States
First Detection4/27/2026
Last Activity4/27/2026
ISPMULTACOM CORPORATION
π―
165
Total Attacks
π
1
Ports
π‘
1
Attack Types
π¦
18
Malware
Geolocation
- Country
- πΊπΈ United States
- City
- Los Angeles
- ASN
- AS35916
- ISP
- MULTACOM CORPORATION
Attack Types
ssh_telnet_honeypot
Attacked Ports
22
Associated Malware
Attempted Credentials
πroot/user123456789
1xπroot/1Qaz@WSX#edc
1xπroot/html
1xπhez/root512
1xπroot/jingjing
1xπheyy/root123
1xπadmin/rootroot1234
1xπroot/3245gs5662d34
1xπroot/pass1234
1xπroot/HUAWEIU2024
1xπroot/dongbang2025
1xπroot/info
1xπroot/qwert12345
1xπroot/emporium
1xπroot/hatang@2026
1xExecuted Commands
$
lscpu | grep Model1x$
ls -lh $(which ls)1x$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x$
uname -a1x$
w1x$
echo "root:ZY09tfGtZ3K1"|chpasswd|bash1x$
cat /proc/cpuinfo | grep name | wc -l1x$
crontab -l1x$
cat /proc/cpuinfo | grep model | grep name | wc -l1x$
which ls1xShodan InternetDB ExposureShodan
InternetDB data, not real-time
Ports
2225
Hostnames
91.202.178.170-dedicated.multacom.com
CPEs
cpe:/o:linux:linux_kernelcpe:/a:openbsd:openssh:10.0p2cpe:/o:debian:debian_linuxcpe:/a:postfix:postfix
Risk Assessment
55
/100
LowMediumHighCritical