Amenaza Activa • MEDIO
206.189.7.73
🎯
2741
Ataques Totales
🔌
1
Puertos
📡
1
Tipos Ataque
🦠
2
Malware
Geolocalizacion
- Pais
- 🇨🇦 Canada
- Ciudad
- Desconocida
- ASN
- AS16276
- ISP
- OVH SAS
Tipos de Ataque
cowrie
Puertos Atacados
22
Malware Asociado
Credenciales Intentadas
🔐test/P@ssword123
2x🔐root/ssh
2x🔐mysql/letmein
2x🔐guest/P@ssword123
2x🔐user/changeme
2x🔐test/654321
2x🔐root/raspberry
2x🔐root/ftp
2x🔐mysql/mysql@123
2x🔐test/123456789
2x🔐oracle/oracle
2x🔐admin/123abc
2x🔐guest/111111
2x🔐guest/P@ssw0rd
2x🔐postgres/password
2xComandos Ejecutados
$
cat /proc/uptime 2 > /dev/null | cut -d. -f16x$
uname -s -v -n -m 2 > /dev/null4x$
uname -m 2 > /dev/null4x$
export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:$PATH; uname=$(uname -s -v -n -m 2>/dev/null); arch=$(uname -m 2>/dev/null); uptime=$(cat /proc/uptime 2>/dev/null | cut -d. -f1); cpus=$( (nproc || grep -c "^processor" /proc/cpuinfo) 2>/dev/null | head -1); cpu_model=$( (grep -m1 -E "model name|Hardware" /proc/cpuinfo | cut -d: -f2- | sed 's/^ *//;s/ *$//' ; lscpu 2>/dev/null | awk -F: '/Model name/ {gsub(/^ +| +$/,"",$2); print $2; exit}' ; dmidecode -s processor-version4xEvaluacion de Riesgo
45
/100
BajoMedioAltoCritico