TROYANOSYVIRUS
Ameaca AtivaMEDIO

45.61.52.18

Primeira Deteccao04/04/2026
Ultima Atividade04/04/2026
ISPKamatera, Inc.
🎯
189
Ataques Totais
🔌
1
Portas
📡
1
Tipos de Ataque
🦠
19
Malware

Geolocalizacao

Pais
🇺🇸 Estados Unidos
Cidade
Los Angeles
ASN
AS36007
ISP
Kamatera, Inc.

Tipos de Ataque

ssh_telnet_honeypot

Portas Atacadas

22

Malware Associado

Credenciais Tentadas

🔐odoo/Odoo12
1x
🔐root/qazwsx888!@#
1x
🔐root/Qwer#$
1x
🔐ubuntu/123qwe!!
1x
🔐tests/qazwsx
1x
🔐steam/Abc@123456
1x
🔐username/123123
1x
🔐test/P@55w0rd
1x
🔐root/qazwsx8888.
1x
🔐root/ZAQ!2wsx654321!!
1x
🔐nvr/nvr
1x
🔐bot/1234
1x
🔐steam/passw0rd!
1x
🔐root/penis123
1x
🔐root/root9999..
1x

Comandos Executados

$Enter new UNIX password:2x
$ls -lh $(which ls)1x
$echo -e "Vpn123456\nGJOOAr1i5r8u\nGJOOAr1i5r8u"|passwd|bash1x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'1x
$uname -a1x
$w1x
$cat /proc/cpuinfo | grep name | wc -l1x
$crontab -l1x
$cat /proc/cpuinfo | grep model | grep name | wc -l1x
$which ls1x

Exposicao Shodan InternetDBShodan

Dados InternetDB, nao em tempo real

Portas
221080
CPEs
cpe:/o:canonical:ubuntu_linuxcpe:/a:openbsd:openssh:8.9p1

Avaliacao de Risco

55
/100
BaixoMedioAltoCritico